Most IM programs, such as Windows Messenger and AOL Instant Messenger (AIM), allow you to build a contact list, or "buddy list," which is similar to the address book in your email program. The best part about this list is that you can choose to block incoming messages from everyone except the people in it. Trillian also has the ability to completely block all incoming messages from unknown users. My recommendation would be to adjust these privacy settings to reduce the amount of spim you receive. AIM also allows you to warn other users about an account that is sending you unwanted instant messages. The warning decreases the number of spim the account can send and shows the AIM address as warned to other users that it may try to message.
If you are using IM at a workplace with no in-house antispam services and you need to accept messages from unknown sources, I would take a look at a Trillian plugin called Trillian Spam Challenge. It attempts to stop spam by confirming that strangers who send you a message are in fact human -- instead of spam-generating robots -- using blacklists, wildcard entries, per-account activation and other methods. Although it is freeware, it does require Trillian Pro.
Unfortunately, it does sound as though it may be too late to save your current accounts, so it may be an idea to start again and create new ones. Be careful when creating a new screen name. Your screen name should not provide or allude to any personal information about you. Most importantly do not list your screen name in public areas, such as large Internet directories or online community profiles. If you have to give out your screen name for business reasons, then try and provide it as an image instead of text as this will make it harder for bots to add it to their databases. Finally, make sure you're using the latest version of your IM software as new antispim features are being introduced in most programs.
Dig Deeper on Email and Messaging Threats-Information Security Threats
Related Q&A from Michael Cobb
Spyware can steal mundane information, track a user's every move and everything in between. Read up on the types of spyware and how to best fix ... Continue Reading
Explore the differences between symmetric vs. asymmetric encryption algorithms, including common uses and examples of both, as well as their pros and... Continue Reading
Pirated software is still a major concern nowadays. Uncover how to prevent software piracy and protect your organization's intellectual property. Continue Reading