Most IM programs, such as Windows Messenger and AOL Instant Messenger (AIM), allow you to build a contact list, or "buddy list," which is similar to the address book in your email program. The best part about this list is that you can choose to block incoming messages from everyone except the people in it. Trillian also has the ability to completely block all incoming messages from unknown users. My recommendation would be to adjust these privacy settings to reduce the amount of spim you receive. AIM also allows you to warn other users about an account that is sending you unwanted instant messages. The warning decreases the number of spim the account can send and shows the AIM address as warned to other users that it may try to message.
If you are using IM at a workplace with no in-house antispam services and you need to accept messages from unknown sources, I would take a look at a Trillian plugin called Trillian Spam Challenge. It attempts to stop spam by confirming that strangers who send you a message are in fact human -- instead of spam-generating robots -- using blacklists, wildcard entries, per-account activation and other methods. Although it is freeware, it does require Trillian Pro.
Unfortunately, it does sound as though it may be too late to save your current accounts, so it may be an idea to start again and create new ones. Be careful when creating a new screen name. Your screen name should not provide or allude to any personal information about you. Most importantly do not list your screen name in public areas, such as large Internet directories or online community profiles. If you have to give out your screen name for business reasons, then try and provide it as an image instead of text as this will make it harder for bots to add it to their databases. Finally, make sure you're using the latest version of your IM software as new antispim features are being introduced in most programs.
Dig Deeper on Email and Messaging Threats-Information Security Threats
Related Q&A from Michael Cobb
Shellcode is a set of instructions that executes a command in software to take control of or exploit a compromised machine. Read up on the malware ... Continue Reading
The popular port scan is a hacking tool that enables attackers to gather information about how corporate networks operate. Learn how to detect and ... Continue Reading
See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.