What does Killspam detect and how ?

We use multiple clusters running different techniques to assess the content of all emails as well as procudures to detect bad attempts and gaining access before they even reach the email servers, remembering that one failure doesnt always mean rejection. In addition, we collect spam data from thousands of sources every minute of the day to ensure we are upto date with the latest threats, some of these services are :

  • Bitdefender Antivirus
  • Microsoft SPF Verification
  • DKIM Verification Keys
  • SURBL’s
  • Sender Verification
  • Reverse DNS failures
  • Multiple RBL’s
  • DMARC Reporting
  • Inbound and Outbound Rate Limiting
  • DNSWL trusted sources
  • PRERBL’s
  • URIRBL’s
  • Two Bayesian pattern matchers
  • Statistical Filters
  • Tet Recognition
  • Image format / size detection
  • PDF analysis
  • DNS RBL’s
  • DCC Control
  • Razor Control
  • Pyzor Control
  • Analyse TNEF Attachments
  • Anti Virus and Malware
  • HTML Controls – Disarm, Block, Allow
  • Message Format Controls
  • Attachment Names
  • Attachment Types
  • Neural Network sender matching
  • Automatic Whitelists
  • Authentication challenges
  • Image scanning
  • Document scanning
  • Compressed file scanning
  • Content and Header checks
  • Anti phishing and Spear Phishing
  • Greylisting
  • DNS Blacklists
  • Country Blacklists
  • URL DNS checking
  • RHSBL checks
  • Tag, Delete or Send spam
  • Outbound Filtering
  • LDAP and Exchange Support
  • DKIM Signing
  • DMARC
  • Completel;y Server based (no client needed)