The FBI has issued a warning about an email scam that attempts to extort money from unwitting recipients. The emails say the recipient is the subject of a criminal investigation and that charges will be pressed soon. The messages go …
In an ironic twist, Tagged.com has won a lawsuit against a spammer. A California judge has found Erik Vogeler guilty of spamming over 6,000 of the site’s members with messages that directed them to adult websites. The judge ordered him …
Wednesday’s launch of the highly anticipated Apple iPad has resulted in a spike of Apple related spam. Security researchers say a 30% spike in phishing spam was detected following the announcement as spammers rushed to take advantage of the huge …
A survey conducted recently found that businesses are experiencing a 70% increase in spam and malware attacks from social networks in the last year.
Over half of the 500 companies received spam via a social network, and more than one third experienced a malware infection from one of these sites.
The perception is growing among businesses that social networks are a risk of more than just employees wasting time. Most companies either take a blanket allow or deny approach to social networks but apply no other measures to address the larger risks that these websites expose them to.
Spam and phishing are rampant on the most popular networks such as Twitter and Facebook. For all the attention paid to email security for businesses, often very little is given to the messaging capabilities of social network sites. Clicking on a malicious link in a Twitter message is no different to the same link delivered via email. From the spammer’s perspective the deliverability rate of their messages is much higher on social networks than it is for email.
These attacks continually come to light in the media. Twitter has notified some users that they may have been subjected to a phishing attack and has forced them to update their passwords to ensure their accounts are not misused. This reactionary step is the closest thing to protection that can be achieved on an unmoderated medium like Twitter that has no entry requirement other than a working email address, and exposes a rich API that is perfect for spam automation systems.
Security researchers have discovered a vicious new virus. Dubbed Win32.Worm.Zimuse.A, it appears to have originated in Slovakia but has been quickly making its way around the world with the highest rate of infection now in the United States, followed by …
The CAN-SPAM Act is supposed to protect us from unwanted commercial email but some U.S. based spammers, who usually call themselves direct marketers, have found a loophole to get around the requirements placed on them by the law. CAN-SPAM says …
A new report out by security experts says that over 25 million new strains of malware were discovered in 2009, and that number is expected to rise in 2010. Trojans are the most popular type distributed, making up 66% of …
Australian financial services firm CommSec was fined $55,000 (roughly $48K US) for violating that country’s Spam Act. The Australian Communications and Media Authority (ACMA) levied the fine after it launched an investigation into the company’s mail campaigns and found they …
A research team from two Californian universities has developed what it believes will be a game changing approach to defeating spam.
The researchers used a captured spam bot to analyze a sample of the spam emails that it produced and then used this information to reverse engineer the template that the spam emails were based upon. Once this template was known 100% of further spam emails from that bot were successfully blocked while avoiding any false positives on one million genuine email messages in the test.
Leading anti-spam products in the market today claim up to 99% accuracy for spam detection and use sophisticated analysis techniques such as Bayesian filtering to reduce false positives. However a large part of the fight against spam remains reactive.
In judo, an attacker’s assets are turned into liabilities by a defender. The attacker’s attributes like weight and size are leveraged against the aggressor and used to neutralize him or her with a flip. A similiar tactic to fight spam propogated by botnets has been developed by an octet of researchers.
The team from the International Computer Science Institute in Berkeley, Calif. and University of California in San Diego–Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage–have developed a way to flip the software running a botnet so it assists spam fighters in blocking the cyber junk spewed by the malware.
- 4SysOps.com – For Windows administrators
- About.com – Business Security
- Al Iverson
- Email management, storage and security
- Ephemeral Law
- Glen’s Exchange Dev Blog
- Ideas, Life & Technology
- Messaging blogs
- Security Tools and Tips
- Spam Notes
- Talk Tech To Me
- Terry Zink