Posts Tagged ‘Spam’

Spam!

Spam!

The Sophos company called the USA the world leader by quantity of spam

According to data published by Sophos, from December 2012 to February 2013 the U.S. generated 18.3% of global spam, providing the country the first place in the world according to the spammers Sophos.V last October, the U.S. has taken in this ranking only third – 6 , 5% of spam, conceded leadership of India – 16.1% of global spam. This year, India has exchanged places with the United States, taking the third place – 4.2%.

Second place in occupied China – 8.2%. Then follow Peru (4%), France, South Korea and Italy (3.4%), Taiwan, and Russia (2.9%), Spain (2.9%), Germany (2.7%) and Iran (2.6%). (more…)

Stop spamThe following are the rules that will help to minimize the amount of spam you receive.

Use multiple email addresses: one for personal correspondence and at least one for registration in forums, chat rooms, mailing lists and other public services and sites.

Personal correspondence pick up e-mail address that is hard to guess. Spammers constructing possible address with the obvious names, words and numbers. Walk up to the task creatively (and, of course, do not use your name and address, last name).

Consider the e-mail address that you use on public resources, as temporary. If the address starts to get spam, just change it.

Do not reply to spam. Spammers often recorded similar responses to identify valid email address. Thus, the answer to the spam email only increases the risk of spam you in the future. (more…)

What is spam?

Posted: March 5, 2013 in Glossary
Tags: , ,

Stop spamSpam – anonymous unsolicited bulk e-mail distribution, ie electronic equivalent of paper advertising mail, regular mail boxes littering.

Spam is most often used to advertise products and services. Spammers send out a large number of advertisements and cashing in on those who are responsible. In addition, the attackers use spam for phishing attacks and malware.

Over the past ten years has expanded the scope of the spam, and the volume of delivery – increased significantly. At first spam was being sent directly to the individual addresses of the users and it was easy to block. Over time, high-speed Internet channels that give fast and cheap opportunity to massively send spam messages. Spammers have also found that they can use for their own purposes modems individual users – modems are not equipped with means of protection against unauthorized access, and could be used by hackers from anywhere planety.Drugimi words, modems unsuspecting users send out huge amounts of spam. (more…)

Spam and phishingSpam has become so commonplace for all that many on it almost stopped paying attention.

However, this is not a reason to be vigilant, as there are two types of fraud with spam, known as “phishing” and “spoofing” (from the English. Fishing and spoofing, respectively). Both of these methods involve the use of fake e-mail messages in which the “from:” field contains a forged sender information.

What is phishing?

Phishing e-mails are used to lure the user’s personal data, as well as information about his account. Also they can be used to force a user to download malicious software. Often in such reports suggest some that require immediate attention to problems with the account of the recipient. The letter will contain a link that leads to a fake website where you are asked to provide personal information, account information, or download a program, which is usually masked by the virus. (more…)

Microsoft Security EssentialsAdditional protection is designed to prevent conduct phishing attacks against users of the service.

According to the developers of Microsoft, the next time was in outlook.com supports standard DMARC (domain-based message authentication, reporting & conformance), is a technology improve security authentication protocols in the email.

Support is currently DMARC implemented in such popular resources as Facebook, Paypal and LinkedIn. In this case, in order to implement this standard on these services is to improve the protection of users from phishing and spam.

“Our implementation DMARC help protect you, visually highlighting messages from legitimate sources – the experts explain. – If the sender supports DMARC, we will place the radio button next to the message that indicates the security letters. ” (more…)

Symantec CorpAccording to Symantec, in the past month, the flow of spam advertising, phishing and malicious messages increased slightly. The level of spam in email traffic was 75.0%, 2.7 points higher than in August.

More junk email from other suffering people of Saudi Arabia (84.9%), and the division by sectors of economic activity – educators (77.9%) and entertainment (77.6%). Among the countries that spammers are leading India (17.4% of spam traffic) and Saudi Arabia (11.7%). The top five for this indicator also includes the United States (6.1%), Turkey (5.1%) and Canada (4.9%).

The most common theme is illegitimate messages advertising pornographic and dating sites, which share in August increased to 47.93%. Flows have also increased advertising replica designer goods, offers employment and casino spam (12.49, 7.83 and 2.26% respectively). Farmaspama share in total garbage posts decreased by 5 points, but still significant (27.64%). (more…)

Twitter spamMessage contains a link to a fake life, the transition to which the victim’s computer becomes a participant in a botnet.

Tags: Twitter, spam, Facebook

As the expert of GFI Labs Chris Boyd, in Twitter discovered a new spam campaign, distributing links to malicious resources under the guise of placing notices in the social network Facebook video file, which allegedly depicted the user to be notified. (more…)

More than 20% of spam comes from India

Posted: September 17, 2012 in IT Security News
Tags:

Stop spamCompanies Entensys and CommTouch prepare an Internet threats in the second quarter of 2012. The product contains statistics and interesting facts from the scope of spam, phishing and virus attacks.

Distributors of malware, spammers and phishers are beginning to exploit the hacked websites. Methods attackers are not limited to unsophisticated capture control of resources, leading to emergency lock. Cybercriminals through various plugins and scripts operate on the basis of sites with good reputation. So they know the login credentials are making the transition to ad sites and download viruses on users’ workstations.

The overall level of spam has stabilized (or slightly below) and was 91 billion emails a day. The share of junk mail in the global e-mail traffic of 76%, which is only one percent higher than the previous quarter. A year ago, at this period, the percentage of spam emails was 96%. (more…)

Stop spamMalicious messages contain a variety of important information to the user, often related to circulation of money.

According to research firm Websense, recently through spam on the Internet spread links to a set of exploits Blackhole.

According to experts, Blackhole is distributed worldwide through spam e-mail messages using a variety of schemes. In one case under the guise of spam distributed notification of a voice mail that came from servers Microsoft Exchange. In the second – the potential victims receive letters of thanks for a subscription to the premium service on the resource accountingWEB.com. In the third – users get different notifications claiming to be from the service of automatic data processing (ADP). (more…)