Preventing your Network from Being Abused by Spammers
|
|
|
- Brook Brown
- 10 years ago
- Views:
Transcription
1 Preventing your Network from Being Abused by Spammers Marcelo H. P. C. Chaves CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet Steering Committee
2 CERT.br Activities Created in 1997 as the national focal point to handle computer security incident reports and activities related to networks connected to the Internet in Brazil CERT.br Incident Handling!!Coordination!!Facilitation!!Support!!Statistics Training and Awareness!!Courses!!Presentations!!Documents!!Meetings Network Monitoring!!Distributed Honeypots!!SpamPots International Partnerships
3 Our Parent Organization: The Brazilian Internet Steering Committee - CGI.br CGI.br is a multi-stakeholder organization that, among the diverse responsibilities, has the main attributions:!!!!!! to propose policies and procedures related to the regulation of Internet activities to recommend standards for technical and operational procedures to establish strategic directives related to the use and development of Internet in Brazil to promote studies and technical standards for the network and services security in the country to coordinate the allocation of Internet addresses (IP) and the registration of domain names using <.br> to collect, organize and disseminate information on Internet services, including indicators and statistics
4 CGI.br and NIC.br Structure GOVERNMENT (Appointed) I. E. CIVIL SOCIETY (Elected) Executive Branch Administrative Support Legal Counsel Pubic Relations Domain Registration IP Assignment Studies and Surveys About ICT use Internet Engineering New Projects W3C Brazilian Office 1 Ministry of Science and Technology (Coordination) 2 Ministry of Communications 3 Presidential Cabinet 4 Ministry of Defense 5 Ministry of Development, Industry and Foreign Trade 6 Ministry of Planning, Budget and Management 7 National Telecommunications Agency 8 National Council of Scientific and Technological Development 9 National Forum of Estate Science and Technology Secretaries 10 Internet Expert 11 Internet Service Providers 12 Telecommunication Infrastructure Providers 13 Hardware and Software Industries 14 General Business Sector Users 15 Non-governmental Entity 16 Non-governmental Entity 17 Non-governmental Entity 18 Non-governmental Entity 19 Academia 20 Academia 21 Academia
5 Agenda! The SpamPots Project! 1 st Phase Review! 2 nd Phase! Port 25 Management! Current Scenario! Impact! Benefits! Adoption & Challenges! User awareness initiatives
6 Understanding and Reducing the Abuse of Brazilian Broadband Networks for sending Spam: SpamPots Project 1 st Phase Review
7 Motivation (1/3)! Brazil is a big "source" of spam! Scans for open proxies are always in the top 10 ports in our honeypots' network statistics Spam complaints related to open proxy abuse have increased in the past few years! Financial fraud is still using spam
8 Motivation (2/3) Spams Reported by SpamCop to CERT.br Most Common Abuse Open Proxy Percentage Direct Delivery Spamvertised Website Months: January 2006 May
9 Motivation (3/3) Brazil on CBL The CBL takes its source data from very large spamtraps/mail infrastructures, and only lists IPs exhibiting characteristics which are specific to open proxies of various sorts (HTTP, socks, AnalogX, wingate etc) and dedicated Spam BOTs which have been abused to send spam, worms/viruses that do their own direct mail transmission ( )! Brazil is the leading country on number of IPs listed:! complete list has 8,949,708 IPs! 1,369,938 (15.31%) from Brazil! Other countries with more than 5%: IN (10.35%), RU (8.01%), TR (7.79%) and PL (5.61%) Domain count % tot telebahia.net.br telesp.com.br brasiltelecom.net.br telet.com.br netservicos.com.br gvt.net.br ig.com.br timbrasil.com.br ctbctelecom.net.br embratel.net.br canbrasnet.com.br ig.com Data extracted on 2009/06/
10 The SpamPots Project! Main Goals! Have metrics about the abuse of our networks! Basically measure the problem from a different point of view: abuse of infrastructure X spams received at the destination! Help develop the spam characterization research! Measure the abuse of end-user machines to send spam! Structure of the 1 st phase! Deployment of 10 low-interaction honeypots, emulating open proxy/relay services and capturing spam! 5 broadband providers! 1 home and 1 business connection each
11 Location of the Sensors in the 1 st Phase
12 Total Data Collected in 466 Days of Operation Data collected by 10 sensors s captured (injected): Potencial recipients Average recipients/ ! 9.1 Average captured s/day! 1.2 Million Unique IPs that injected spam Unique Autonomous Systems (AS) Unique Country Codes (CCs) 165
13 Distribution by Country Code # CC s % 01 TW 385,189, CN 82,884, US 29,764, CA 6,684, JP 5,381, HK 4,383, KR 4,093, UA 1,806, DE 934, BR 863, Subtotal: Percentage of s Received Over the Period
14 Distribution by Autonomous System # AS CC % 01 TFN-TW TW HINET TW CNCGROUP CN SEEDNET TW NCIC-TW TW CHINA169 CN NDCHOST US CHINANET CN EXTRALAN TW LOOKAS CA Percentage of s Received Over the Period
15 TCP Ports Abused Over the Period # TCP Port Protocol Usual Service % SOCKS socks! HTTP alternate http! HTTP http! HTTP Squid! HTTP alternate http! HTTP AnalogX! SMTP smtp! HTTP Proxy+! SOCKS MyDoom Backdoor! HTTP Sobig.f Backdoor! HTTP alternate http! 0.96
16 Requests to the HTTP and SOCKS Modules Number of requests received by the modules, divided according to outbound requested connection type: HTTP Type Requests % connect to 25/TCP 89,496, connect to others 106, get 225, errors 1,847, total 91,677, SOCKS Type Requests % connect to 25/TCP 46,776, connect to others 1,055, errors 5,741,908 10,72 total 53,573,
17 Among the Activities Observed...! Main results:! 99.84% of connections originated from abroad! Spammers used all the upload bandwidth available! More than 90% of spams targetted networks in other countries! Among the outgoing activity that was not aimed at port 25/TCP:! attempts to connect to Yahoo! servers using the Yahoo! Messenger Protocol, via the abuse of SOCKS proxies
18 Current Anti-spam Activities
19 Data Mining: Characterization of Spam Campaigns! Frequent Pattern Tree showing different spam campaigns!! node s color represents a di"erent feature that varied among the messages at that level!! diameter of the node is proportional to the log of the frequency of the characteristic in the campaign! Some characteristics taken into account:!!!!!! Common keywords Message layout Language Encoding type Similar URLs Services abused Work developed by researchers from the Federal University of Minas Gerais (DCC/UFMG)
20 Collaboration with TW Authorities! MoU with TW NCC (National Communications Commission), TWCERT/CC and TWIA (Taiwan Internet Association)! Send data weekly about spam coming from and returning to Taiwan! They are identifying and shuting down spammers operations! We are discussing the implementation of a sensor in Taiwan
21 Collaboration with JP Authorities! In the past few months the activities seen changed! IPs assigned to Philipines are attempting to send spam to mobile phones in Japan! JPCERT/CC and the Japanese Embassy in Brazil contacted us regarding "spam coming from Brazil"! the data being collected at the active sensors is being sent to them so they can pursue their investigations! They are sharing a case study on the success of Port 25 Management adoption in Japan, regarding the abuse of Japanese networks for sending spam
22 Understanding the Abuse of Worldwide Distributed Networks for sending Spam: SpamPots Project 2 nd Phase
23 Deployment of spampots' sensors worldwide! Global view of the data! Help other networks to understand and prevent being abused by spammers! Better understand the abuse of the Internet infrastructure by spammers! Use the spam collected to improve antispam filters! Develop better ways to! identify phishing and malware! identify botnets via the abuse of open proxies and relays! Provide data to trusted parties! help the constituency to identify infected machines! identify malware and scams targeting their constituency
24 We are Looking for Partners Interested in...! Receiving data! spams, URLs, IPs abusing the sensors, etc! Hosting a sensor! Helping to improve the technology! Analysis, capture, collection, correlation with other data sources, etc! All partners will have access to all data if they want! We are currently working with networks in the following countries/economies: AU, UY, PL, TW, HK and JP.
25 Preventing the Abuse: Port 25 Management
26 Current Scenario: The Abuse
27 Port 25 Management Differentiate client-server submission from the transmission among servers! The adoption of port 25 management need to be articulated among competing sectors! providers! deploy message submission, typically on port 587/TCP (RFC 4409), and deploy SMTP authentication! Broadband/dial-up providers (for end users)! prevent direct delivery (filtering outgoing traffic targetting port 25/TCP)
28 Port 25 Management: Impact
29 Port 25 Management: Benefits! Network provider IP blocks excluded from block lists! Less end user complaints! Makes the abuse of the Internet infrastructure for malicious activities (fraud, identity theft, etc) harder! Enhances the ability of tracking abuse cases! Acts on the submission, before the message gets in the infrastructure! Reduces the international bandwidth consumption by spammers! Reduces operational costs! Spam was pointed out as the main responsible for consuming the largest amount of operational resources on 2008 Worldwide Infrastructure Security Report (
30 Port 25 Management: Adoption & Challenges! Adoption! Wolrdwide Brazil Sercomtel (Londrina/PR)! CGI.br s Resolution CGI.br/RES/2009/001/P Challenges! Increase on the load of provider s user support! Network providers need to differentiate between end user and business connections! Exception handling (outdated/legacy software)
31 Port 25 Management on Antispam.br
32 User Awareness
33 Antispam.br Website - Malicious Code Through
34 Antispam.br Website - Fraud, Phishing, Scam, etc
35 Cartoons! 4 videos! 4 minutes each! The Internet! The Intruders! Spam! The Defense! Freely available on the Internet! In several formats and resolutions! English version (subtitles) already available: English (voice-over and written texts) to be released very soon! Q-CERT interested in making an Arabic voice-over
36 Video 1: The Internet
37 Video 2: The Intruders
38 Video 3: Spam
39 Video 4: The Defense
40 Stickers with the Characters
41 Additional References! This presentation (next week) CERT.br Computer Emergency Response Team Brazil Antispam.br
SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam
SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center
honeytarg Chapter Activities
honeytarg Chapter Activities Marcelo Chaves [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda
Development of an IPv6 Honeypot
Development of an IPv6 Honeypot Klaus Steding-Jessen [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center Brazil CGI.br Brazilian Internet Steering Committee
Phishing and Banking Trojan Cases Affecting Brazil
Phishing and Banking Trojan Cases Affecting Brazil Cristine Hoepers [email protected]! Centro de Estudos, Resposta e Tratamento de Incidentes de Segurança no Brasil Núcleo de Informação e Coordenação do
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian
CERT.br: Mission and Services
CERT.br: Mission and Services Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/ Conferencia
Incident Response and Early Warning Initiatives in Brazil
Incident Response and Early Warning Initiatives in Brazil Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
About Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
Fraud and Phishing Scam Response Arrangements in Brazil
Fraud and Phishing Scam Response Arrangements in Brazil Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
Xerox Multifunction Devices. Network Configuration. Domain 2. Domino Server 2. Notes. MIME to Notes. Port. Domino. Server 1.
Xerox Multifunction Devices Customer Tips September 17, 2003 NOTE: Information in this document applies to the following multifunction device software levels: WorkCentre Pros - all software levels DC 555/545/535
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016 DDoS Atacks: Detection, Analysis and Mitigation Lucimara Desiderá [email protected] Klaus Steding-Jessen [email protected] Internet Governance in Brazil:
4 Messaging Technology
4 Messaging Technology Previously this was published as the Email Technical Report. From this volume we have changed the name to Messaging Technology. Messaging Technology 4.1 Introduction Messaging Technology
The Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
The Brazilian Internet Steering Committee CGI.br Internet Governance Model in Brazil
ian Internet Steering Committee CGI.br Internet Governance Model in rev. July 2014 CGI.br - ian Internet Steering Committee NIC.br ian Network Information Center CETIC.br Center of Studies on Information
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
Sender Authentication Technology Deployment and Authentication Identifiers
2. Sender Authentication Technology Deployment and Authentication Identifiers In this report we will present an overview of spam trends for week 14 through week 26 of 2012. The ratio of spam has dropped
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
To install the SMTP service:
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
Attachment spam the latest trend
the latest trend Spammers using common file formats as attachments for pumpand-dump scams This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS INTRODUCTION BOTNETS IN SPAMMING WHAT IS AUTORE? FACING CHALLENGES? WE CAN SOLVE THEM METHODS TO DEAL WITH THAT CHALLENGES Extract URL string, source server
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015. Black market of cybercrime in Russia
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015 Black market of cybercrime in Russia WHOAMI Information Security Manager (Russia and CIS) Information Security Officer Information Security
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report August 2008 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Joseph Long
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Monitoring WAAS Using Cisco Network Analysis Module. Information About NAM CHAPTER
CHAPTER 5 Monitoring WAAS Using Cisco Network Analysis Module This chapter describes Cisco Network Analysis Module (NAM), which you can use to monitor your WAAS devices. This chapter contains the following
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Trend Micro Healthcare Compliance Solutions
How Trend Micro s innovative security solutions help healthcare organizations address risk and compliance challenges WHITE Worry-Free Business Security Fast, effective, and simple protection against viruses
The Growing Problem of Outbound Spam
y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Chapter 3 Restricting Access From Your Network
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.
Resilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
The anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to [email protected] (March2010) I. What this document is about II. Introduction III. The anatomy of an
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
