The volume of unwanted messages inched up another percentage point during March 2004, pushing the spam ratio to 63 percent. Of the 93 billion messages Brightmail’s Probe Network filtered during the month, 58.6 billion were identified as spam. Unsolicited product-related messages continue to garner the largest piece of the spam pie, while scam messages experienced the biggest decrease.
|March 2004 Spam Category Data|
|Type of Spam||Feb. Volume||March Volume||Change|
|Source: Brightmail Logistics and Operations Center (BLOC)|
Despite the mounting volume, consumers are becoming increasingly spam-savvy. The overwhelming majority of the 1,000 respondents to an online survey, conducted for Symantec by Applied Research, reported that they delete spam without opening the email, and roughly half identify spam just by looking at the sender’s name. Interestingly, the survey, which compiled the results by age group, found that seniors were the most spam-savvy online demographic, as they are less likely to take inappropriate actions when dealing with unsolicited messages.
The messages from the U.S. are not abating, as Brightmail’s Probe Network found that 80 percent of spam messages were in English, and Commtouch Inc. identified 60 percent of all spam originating in the United States during the month of March, with China a very distant second place at 6 percent.
Oren Drori, director of product marketing, Commtouch Inc., identifies two types of spammers. Type 1 are essentially “aggressive marketers, but ones who do not define themselves as criminal” or use criminal methods, while Type 2 are “hardcore, rogue spammers – those use very sneaky ways for spamming: multilevel marketing, planting Trojan (viruses) in PCs of innocent unaware DSL users etc.”
According to Drori, Type 1 spammers are already using non-U.S. server farms for distributing spam (even though they are Americans, targeting the U.S. market), and greater numbers of these spammers will outsource their distribution to non-US countries – typically eastern Europe and southeast Asia.
Each attack from Type 2 spammers is actually distributed from thousands of sources in parallel, and it is almost impossible to trace the original spammer. “Type 1 (semi-legit marketers) are responsible for about 20 percent of the spam, and Type 2, the rogue ones, account for about 80 percent. So, as a bottom line, we can still expect very significant numbers to originate from the U.S.,” Drori says.
As a Pew Internet & American Life Project report found, there have been more unwanted messages since CAN-SPAM was enacted. Avner Amram, executive vice president, Commtouch Inc., says, “Can-Spam will make it harder to spam, but not stop or slow it down.”
Amram continues, “…Can-Spam can help to some extent, it will certainly have a deterrent effect on some of the spammers, which will stop their wrongdoing, but it will certainly push some of the spammers to spam from overseas (especially when in this global era, they are not required to physically go and live overseas, they can just use overseas computers).”
All these unwanted messages are adding up to $4 billion a year in lost corporate productivity, according to the Yankee Group, and mi2g estimates that the “Big Three” malware variants – NetSky, Bagle and MyDoom – generated combined economic damage of $128 billion worldwide in the first quarter of 2004.
NetSky topped Postini’s list of virus threats for March, with MyDoom and Bagle lagging considerably behind. Of the more than 4.6 billion messages Postini processed, roughly 61.2 million were identified with viruses, measuring an increase of 6 percent from February 2004.
|Top Ten Viruses of March 2004:|
|Virus Name||Quantity Detected|
We're always talking about the growing convergence of the physical and digital worlds. Here are five brands with great phygital campaigns all over the world.
We talk a lot about content. How to make it, what makes it work, how to measure it’s effects, if there’s too ... read more
Amazon is well-known for sending emails just for you. But a business doesn't have to be Amazon-sized to successfully deploy the same strategy.
Instead of launching a fully-formed new program, try innovating in increments, where you make a series of small changes that eventually add up to something big.