- M3AAWG Messaging playlist on YouTube
- Selected Training Videos (also available on www.youtube.com/maawg)
- Selected Keynote Videos (also available on www.youtube.com/maawg)
Below are the M3AAWG published materials related to our messaging anti-abuse work. There is also a Messaging video playlist on our YouTube channel at www.youtube.com/maawg and there are a few selected videos on our website in the Training Videos and Keynotes Videos sections under the Meetings menu tab.
Best Practices
M3AAWG Describes Costs Associated with Using Crypto
This document describes the budget and other costs associated with using cryptography to help make informed decisions when deploying encryption.
M3AAWG Password Managers Usage Recommendations
Most users struggle to manage a large number of usernames and passwords. While password managers have both proponents and detractors, these recommendations reflect the general consensus of the industry.
M3AAWG Initial Recommendations: Arming Businesses Against DDoS Attacks
Distributed Denial of Service attacks continue to be a major concern. This guide helps businesses prepare for DDoS attacks and, as a side benefit, some of these same techniques can also help businesses that suddenly see a large increase in legitimate customer web traffic.
M3AAWG Password Recommendations for Account Providers
Passwords are used virtually everywhere. This document provides password requirement recommendations for ISPs and other providers and briefly describes the risk model of using passwords to provide authorized or secure access to resources. It aims to improve end-user security by encouraging strong passwords.
M3AAWG Multifactor Authentication Recommendations
While passwords are the default solution for securing users' accounts today, they have many shortcomings and most can be easily cracked. M3AAWG believes the time has come for providers to require multifactor authentication, instead of simple passwords, to enhance protection of services with a history or substantial risk of account compromise.
Pages
Public Policy Comments
Using Generic Top Level Domain Registration Information (WHOIS Data) in Anti-Abuse Operations
WHOIS information plays a key role in determining where to report instances of abuse involving domain names. This paper explains some of the important WHOIS elements used to fight spam, phishing, malware distribution and other threats.
M3AAWG Comments on U.S. FCC Protecting the Privacy of Customers of Broadband and Other Telecommunications Services
Submitted on May 27, 2016 responding to a U.S. Federal Communications Communications Notice of Proposed Rulemaking from the Wireline Competition Bureau. All comments and the FCC proposal are available at http://apps.fcc.gov/ecfs/proceeding/view/view?name=16-106.
Note: The FCC released its Rules to Protect Broadband Consumer Privacy on October 26, 2016, quoting several comments from M3AAWG.
Comments on Implementation of CSRIC III Cybersecurity Best Practices
M3AAWG submitted these comments with the new M3AAWG Bot Metrics Report in response to the U.S, Federal Communications Communications request for comments on the status of the implementation of CSRIC III best practices.
Additional Responses from Dr. Paul Vixie to the U.S. Senate Hearing on "Taking Down Botnets: Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks"
Dr. Vixie's August 4th written response to additional questions requested after the hearing on botnet takedowns is also available from the official U.S. Committee on the Judiciary Committee hearing website at
www.judiciary.senate.gov/download/vixie-qfrs-71514 .
M3AAWG Comments on ICANN Misuse Report
Submitted to ICANN in December 2013 in response to ICANN's misuse survey.
Pages
M3AAWG Reports
M3AAWG Email Metrics Report
Pages
DM3Z Blog
Updates and Commentary from the Messaging, Malware and Mobile Anti-Abuse Working Group
There is no blog posts.
Pages
News
News Releases
André Leduc Receives M3AAWG 2016 JD Falk Award for Operation Safety-Net and CASL Work that Protects Online Users
Global Cyber Alliance Joins Forces with M3AAWG to Drive Industry Adoption of Cybersecurity Solutions
Internet Infrastructure Coalition (i2Coalition) Joins M3AAWG to Reduce Hosting Industry Abuse, Will Fight Spam, Malware and Other Cloud and Hosting Threats
Pages
Articles About M3AAWG
Hackers Shut Down ProPublica’s Email For a Day. Here’s How to Stop Attacks Like That.
ProPublica's Julia Angwin augments her earlier "list bomb" article with information on what can be done to prevent these attacks.
How Journalists Fought Back Against Crippling Email Bombs
ProPublica journalist Julia Angwin describes how she and colleages were "list bombed" and talks about the growing problem, including a preventive strategy developed by M3AAWG.
Videos

