When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Hackers have found a creative new way to distribute spam by abusing the infrastructure of legitimate websites.
As a result, the campaigns are more successful in reaching peoples inboxes.
No validation
The attack works by overloading the name field with text and a link.
But the good news is that the emails sent like this are easy to spot.
They still look, and read, like your usual post-signup email, albeit with somewhat modified content.