Search This Blog

Thursday, April 09, 2009

The state of spam 2009, Part 1

Sources of spam statistics
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Avaya
rule

Teleworking: Value for Virtual Workers
This white paper illustrates how teleworking is growing and transforming the way companies do business. It covers the business issues and benefits of implementing a Teleworker solution.

rule

Spotlight Story
The state of spam 2009, Part 1

M. E. Kabay By M. E. Kabay
Spam - not SPAM the luncheon meat (and you have GOT to visit the official SPAM Web site, which plays like a parody the Monty Python crew might have dreamed up) - is a dreadful nuisance, with estimates that 95% of all e-mail in the world now consists of rubbish. Periodically I look into the state of the spam to see how the war is going. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

As image spam declines, PDF spam ready to take its place Security vendors and users agree that image spam is finally on the decline, but at the same time a new kind of spam is emerging that uses an attached PDF file to trick recipients into buying stock in a company.

For spammers, a picture is better than 1,000 words Spam is again on the rise, led by a flood of junk images that spammers have crafted over the past few months to trick e-mail filters, according to security vendors.

The state of spam: An interview with Jamie de Guerre, Part 1 Spam is a major operational problem for all professionals because of its waste of bandwidth; it is a significant nuisance even for non-professionals, contributing to computer-based crime and increasing doubts about e-commerce. I recently interviewed Cloudmark CTO Jamie de Guerre via e-mail and am pleased to convey our discussion in a two-part report.

The state of spam: An interview with Jamie de Guerre, Part 2 What does the future hold for fighting spam? My two-part interview with Jamie de Guerre, CTO of Cloudmark, concludes today.

MSN blunder causes user confusion, smells phishy It may have look like a phishing attack, but an alert sent out to Windows Live Messenger (MSN) users to change their details was triggered by an internal blunder in the US.

Spam recovers from a knockout blow The Internet is now officially as bad as ever, at least as far as spam goes.

US convicts first foreigner of phishing A 23-year-old Romanian man has become the first foreigner to be convicted by a U.S. court for phishing.

IE8 best at blocking malware sites, says study A recently released report claims that Internet Explorer 8 (IE8) is more than twice as effective at blocking malware sites than its nearest rival.

Spam filters block legitimate e-mail, finds test Many antispam products still block an inconvenient amount of legitimate email, a new test of leading products has suggested.

Cyberspies have compromised U.S. power grid, newspaper reports Cyberspies, probably from Russia or China, have penetrated the U.S. electrical grid and left behind software programs that can disrupt it, says an article in the Wall Street Journal that neither names the source of the information nor where this compromise of the grid is occurring.

Chinese information warfare capabilities As world economic conditions continue to worsen, I expect to see growing use of industrial espionage techniques by current actors and by new ones. Threats against proprietary information and perhaps even risks from sabotage may well increase over the next months and perhaps years. Despite the reflex tendency for retrenchment as revenues fall, now is not the time to be reducing the information security workforce.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Avaya
rule

Teleworking: Value for Virtual Workers
This white paper illustrates how teleworking is growing and transforming the way companies do business. It covers the business issues and benefits of implementing a Teleworker solution.

rule

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now

 

04/09/09

Today's most-read stories:

  1. Internet-wide problem to be revealed at conference
  2. FBI claims ISP stole millions from AT&T, Verizon
  3. Apple seen readying huge Wi-Fi boost for iPod Touch, iPhone
  4. Sun made colossal mistake in turning down IBM offer
  5. A Wi-Fi virus outbreak? Researchers say it's possible
  6. AT&T begins massive network upgrade
  7. Afraid of losing your job to a younger, cheaper IT worker?
  8. Top 10 technology skills
  9. Should Cisco move on Sun?
  10. Cyberspies have compromised U.S. power grid, newspaper reports
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: