Worth Reading: Hijacked IP Addresses Malicious actors use IP addresses properly registered to someone else. They send spam using the purloined IP for as long as they can and move on to newly-stolen IP addresses when the first one is effectively blocked. Related ← Worth Reading: A Tale Of Two Technologies — the Stories Of IPv6 And 5GWorth Reading: [Podcast] Can technology curb centralization in the Internet? →