An anti-spam working group releases its first metrics on abusive e-mail; personalized malware hits the market.
Crippled data speeds aren’t yet caused by tiered Internet service. The Messaging Anti-Abuse Working Group, a new body that aims to measure and reduce spam, released its first report which estimates 80 percent of all Internet traffic today is comprised of abusive email.
In the report, the organization finds out of 127.2 million represented email boxes, there were 61.342 billion dropped connections (email undelivered due to server outage); 142.534 billion blocked or tagged inbound emails; and 36.593 billion unaltered, delivered emails in the fourth quarter of 2005. The ratio of blocked or tagged inbound email to valid email is 5.6 to 1, or 85 percent.
Security software firm Panda Software uncovered operations of a firm offered to design made-to-measure Trojan horses (define) to hackers for $990. One Trojan detected by the security firm was programmed to steal bank information from Web forms. The company worked with RSA Security to take down the developer of malicious code for-hire by the first week in March.
An evolution in phishing ( define)attacks that appear to be sent from bank and financial institutions was recognized by AppRiver. Instead of the typical phishing email stating a user’s account is in peril, a number of emails were made to look as if they came from Chase Manhattan bank. These asked customers to take a survey and receive a credit of $20 dollars as a reward.
Nine signature-busting attacks were observed out of the 25 new viruses detected by Commtouch in February. Signature-busting attacks are those with a distribution mechanism engineered to break in before anti-virus companies recognize, create a patch and update computers running anti-virus software. The nine threats ranged in intensity, four were rated "low intensity;" three registered "significant;" one reached "medium-high" threat status and another was classified as "massive" by the security firm.
|Spam Origins, February 2006|
|Republic of Korea||3.78|
|Source: Commtouch, 2006|
Meanwhile, Commtouch said spam accounted for 46.4 percent of all email traffic for corporate users. Consumer email accounts reached a much higher rate, 41.5 percent of all personal email is classified as spam. The combined average on a global level is 58.2 percent, about two out of every three emails.
|Major Spam Categories, February 2006|
|Source: Commtouch, 2006|
Spammers continue to utilize established domains for mailings. Out of 258 million samples analyzed by the security firm, 6.1 million allegedly came from Hotmail.com; four million from Yahoo.com; 1.7 million from Verizon.com; and between one and 1.5 million appeared to be sent from MSN, PayPal, Cisco and Gmail.
MessageLabs captured the global ratio of spam in email traffic from new and unknown sources at 60.6 percent, a six percent decline from January. The global ratio of email borne viruses was 44.1 percent, just under the rate of the previous month. Phishing increased half a percent in January. One in 334.9 emails was a phishing attempt.
In its semi-annual Internet security threat report, Symantec notes an increase in threats designed to facilitate cyber crime. It finds attackers are focusing their efforts on regional targets, desktops and Web applications to capture personal, financial and confidential information, rather than making large-scale attacks. The trend was first recognized in the company’s previous report and remains a continuing threat to computer users.
Kaspersky Labs recorded movement in its Online Scanner measurement of virus threat activity. It saw 12 new malicious programs in February. Only two of the top five threats ranked in January remained on the top 20 list in February.
|Online Scanner Top 20, February 2006|
|Other malicious programs||78.05|
|Source: Kaspersky Lab, 2006|
US Consumer Device Preference Report
Traditionally desktops have shown to convert better than mobile devices however, 2015 might be a tipping point for mobile conversions! Download this report to find why mobile users are more important then ever.
E-Commerce Customer Lifecycle
Have you ever wondered what factors influence online spending or why shoppers abandon their cart? This data-rich infogram offers actionable insight into creating a more seamless online shopping experience across the multiple devices consumers are using.
September 9, 2015
12pm ET/9am PT
September 16, 2015
12pm ET/9am PT
September 23, 2015
12pm ET/ 9am PT