The State of Spam A Monthly Report October Generated by Symantec Messaging and Web Security
|
|
|
- Chloe Smith
- 10 years ago
- Views:
Transcription
1 The State of Spam A Monthly Report October 2007 Generated by Symantec Messaging and Web Security
2 Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Charles Var PR contact Contributors Francisco Pardo Sr Security Analyst Symantec Security Response Pavlo Prodanchuk Sr Security Analyst Symantec Security Response Paras Gupta Sr Security Analyst Symantec Security Response Kevin Yu Security Response Lead Symantec Security Response Amanda Grady Customer Response Analyst Antispam Engineering Takako Yoshida Customer Response Analyst Antispam Engineering
3 Monthly Spam Landscape September saw PDF, Image, and Ecard spam fall further off the radar, while overall spam levels continue to inch upwards increasing by 1% to 70% of all traffic. Spammers also took a special interest in the U.S. housing market, capitalizing on news about the U.S. housing slump and the recent interest rate cut. Highlights from this month included: Spam Levels Continue to Inch Upwards. Overall spam levels at the SMTP layer in September increased slightly to average 70% of total . This compared with 69% of total in August. Image Spam Fades Further. Image spam, which has recently fallen out of favor with spammers, faded even further in September and averaged 7% of total spam. This compared with 10% of total spam in August. (See Page 5) Text- and HTML-based Attacks Pick Up the Slack. While image spam is declining, textbased attacks are still very much in the wild: - Job Seekers Wanted by Spammers - Reusing URLS and Common Brands Linked in Spam Messages - Format of Geocities URLs Used in Spam Continues and Diversifies - Use of Javascript Comments to Obfuscate URLs - Chinese Electronic Product Spam Through ebay Spammers Feed Off Housing Crisis. The recent discussion over interest rate cuts and weakness in the U.S. housing market does not go unnoticed by some spammers. (See Page 6) Spam spotlight: Regional spam trends EMEA. Percentages of Identified as Spam Defined: Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when scanned at the mail gateway. This metric represents SMTP layer filtering and does not include the volumes of detected at the network layer A trend line has been added to demonstrate a 7-day moving average.
4 Global Spam Categories Defined: Spam category data is collected from classifications on messages passing through the Symantec Probe Network. Global Spam Categories (90 Days) inancial Adult 7 raud Scams 0 ealth 2 Products 2 nternet Leisure 2
5 Category Definitions Product attacks offering or advertising general goods and services. Examples: devices, investigation services, clothing, makeup Adult attacks containing or referring to products or services intended for persons above the age of 18, often offensive or inappropriate. Examples: porn, personal ads, relationship advice Financial attacks that contain references or offers related to money, the stock market or other financial opportunities. Examples: investments, credit reports, real estate, loans Scams attacks recognized as fraudulent, intentionally misguiding, or known to result in fraudulent activity on the part of the sender. Examples: Nigerian investment, pyramid schemes, chain letters Health attacks offering or advertising health-related products and services. Examples: pharmaceuticals, medical treatments, herbal remedies Fraud attacks that appear to be from a well-known company, but are not. Also known as brand spoofing or phishing, these messages are often used to trick users into revealing personal information such as address, financial information and passwords. Examples: account notification, credit card verification, billing updates Leisure attacks offering or advertising prizes, awards, or discounted leisure activities. Examples: vacation offers, online casinos, games Internet attacks specifically offering or advertising Internet or computer-related goods and services. Examples: web hosting, web design, spamware Political Messages advertising a political candidate s campaign, offers to donate money to a political party or political cause, offers for products related to a political figure/campaign, etc. Examples: political party, elections, donations Spiritual attacks with information pertaining to religious or spiritual evangelization and/or services. Examples: psychics, astrology, organized religion, outreach Other s attacks not pertaining to any other category. 3
6 Regions of Origin Defined: Region of origin represents the percentage of messages reported coming from each of the following regions: North America, South America, Europe, Australia/Oceania, Asia and Africa a rica asia australia oceania europe north america south america 4
7 Percent Image Spam Defined: Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when scanned at the mail gateway. This metric represents SMTP layer filtering and does not include the volumes of detected at the network layer A trend line has been added to demonstrate a 7-day moving average. 5
8 Additional Insights Spammers Feed Off Housing Crisis There has been much talk of late about the slowdown in the U.S. housing market and the recent interest rate cut by the U.S. Federal Reserve. The uncertainty in the housing market has not been ignored by spammers. Recently, Symantec has observed a plethora of spam messages which are trying to tap into the market uncertainty. The spam messages range from refinancing deals to offers on houses to asking users if the Equity in their home is being used. Subject lines include: While leveraging peoples fears about the housing market, spammers evaluate whether the recipient is eligible for one of these offers. During the evaluation process, the spammer collects a large amount of personal information about the user such as name, address, address, telephone number, etc. This is just another example of how spammers are using current news events to target individuals with their spam wares. 6
9 Job Seekers Wanted By Spammers Work at home spam messages have long been a stable message for spammers. These spam messages promise high wages for minimal effort- the prerequisites for some employees. The messages take the form of a job recruitment . Legitimate recruitment message are common these days as many recruiters use online resources to find new employees. This month, Symantec observed one particular Work at home spam attack which comprised of over 100 million spam messages. 7
10 Reusing URLS and Common Brands Linked in Spam Messages What do the following products and services have in common? Black Visa cards,universal Makeovers, History Channel magazine subscriptions, and Dominos pizza. These products and services can be linked by recent spam attacks. The spam messages provide gift cards for these products and services if the recipient completes a survey. The interesting thing about these spam messages is that the spammers are consistently reusing the same spammy URL links while offering gift cards from well known brands. The technique of reusing URLs has previously been observed by Symantec, but the rate at which spammers are reusing URLs has become particularly blatant in recent times. April saw spammers using a particular URL to offer Dominos pizza gift cards and then in September, Symantec saw spammers using the same URL to offer History channel magazine subscription gift cards. Symantec has observed similar techniques used in Wallmart- and Target-related gift card spam. 8
11 Format of Geocities URLs Used in Spam Continues and Diversifies Geocities offers users among other things an opportunity to build free Websites. Symantec has previously observed that spammers have sent spam s with links to Geocities URLs. While spammers continue to use Geocities URL links of the form geocities.com/abcd38/ in their spam s, Symantec has recently observed spammers using URLs of the form geocities.com\/\/abc98\\\///. Notice the extra forward and back slashes around the folder name. While the change is very subtle, it is another example of how spammers are testing new techniques to try and evade antispam filters. Use of Javascript Comments to Obfuscate URLs During recent months when spammers were using cn domains in their messages, Symantec saw a constant stream of medication spam s using broken URLs. Spammers have long obfuscated URLs by using HTML tags in the middle of the link, such as <b> and <div>. When viewed in an HTML , the URL looks normal to the end user and the URL is clickable. This month, JavaScript comments have been added and an attack of 400,000 messages was observed in a one-week period. Raw html: What the end user sees: 9
12 Chinese Electronic Product Spam through ebay This is not a phishing attack but a straightforward product spam. The code from a legitimate ebay message has been taken in order to make the appear as though it s coming through ebay. Even from the salutation alone, Dear Friend, this is an obvious spam. Spam Spotlight: Regional Spam Trends EMEA inancial 2 Adult 2 raud ealth nternet Scams 2 Leisure Products 22 Overall spam trends in EMEA region have remained pretty consistent with trends observed in other regions. Symantec has, however, previously observed that spam attacks are more routinely being translated into languages apart from English. Some of the more high profile spam attacks by language are profiled below. 10
13 Adult Spam Plagues French Language Spam The subject and message content are often fully translated into French. Subject lines for this spam messages have included: One interesting thing to note is that the URL in the message body is often used previously in English language spam. Messages are of the form: 11
14 Portuguese Language is Added to Weight Loss Spam The subject lines for this spam have included: The interesting thing about this spam attack is that spammers have also set up dedicated Portuguese language URLs to include in their spam messages. In Italy, Germany, and Spain Spammers Continue to Gamble on Casino Spam The subject lines for this spam have included: 12
15 Spammers See Opportune Time to Use Russian Language Watch Spam Other Russian spam attacks observed recently have included novel Russian resume spam and Russian phishing attacks. Novel Russian Resume Spam Times are hard. We blocked over 12,000 copies of this Russian in a four-day period. The content of the is the curriculum vitae of an economics graduate looking for a job. 13
16 Russian Phishing Here is a recent Russian phishing attack which consisted of over 10,000 messages in one day. 14
The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report August 2008 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Joseph Long
The State of Spam A Monthly Report December 2007. Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report December 2007 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Charles Var
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Understanding Junk E-mail filtering & Anti-Spam controls
Understanding Junk E-mail filtering & Anti-Spam controls Overview: the antispam defenses at ODU are a two layered approach. Our first wall of defense is called Spamtrap, and it can be accessed at https://spamtrap.odu.edu
How to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
About junk e-mail protection
About junk e-mail protection Entourage 2008 Junk E-Mail Protection Entourage has a built-in junk mail filter that helps separate junk e-mail also called spam from legitimate messages. By default, the level
Kaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
http://connectwise.reflexion.net/login?domain=connectwise.net
ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.
WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001
WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their
Top 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
INSIDE. Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization. Symantec Online Fraud Management
Symantec Online Fraud Management WHITE PAPER Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization INSIDE New online threats Impacts on customer trust and brand confidence
Deliverability Benchmark Report
Deliverability Benchmark Report Deliverability Benchmark Report Analysis of Placement Rates in 1 Deliverability Benchmark Report Introduction Marketers have spent years honing their email expertise, refining
Phishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
Information Security Field Guide to Identifying Phishing and Scams
Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0
SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0 Angelos Kottas, Sr. Manager, Product Management Amanda Grady, Sr. Product Manager SR B10: Submissions 2.0 1
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Managing Junk Mail. About the Junk Mail Filter
Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious
Email Spam Filtering Sophos
SPAM FILTERING Spam, or unsolicited bulk email, is problem many email users encounter. Niagara College is no exception. Some estimates report that the volume of spam doubles every four to eight months.
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Summer 2009. Brandjacking Index
Summer 2009 Brandjacking Index Brandjacking Index Online Risks in Pharmaceutical Market - Summer 2009 Contents Executive Summary... 3 Pharmaceutical Brandjacking... 3 Phishing Trends... 10 Conclusions...
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
Symantec Hosted Mail Security Administration Guide
Symantec Hosted Mail Security Administration Guide Symantec Hosted Mail Security Administration Guide Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Fighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
turbosmtp New Dashboard Handbook
turbosmtp New Dashboard Handbook DASHBOARD Real-Time Stats This control panel gives you a quick and general sight of your mailing's results: that is, all the interactions that your recipients have made
Email Guidelines. The following guidelines are for companies who develop email HTML design/creative and copy.
The following guidelines are for companies who develop email HTML design/creative and copy. In today s email environment it is imperative that mailers consider the limitations presented by email readers
5 tips to improve your email database. An Experian Data Quality white paper
5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0
GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003
Email Security 8.0 User Guide
Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4
MailMarshal SMTP 2006 Anti-Spam Technology
MailMarshal SMTP 2006 Anti-Spam Technology August, 2006 Contents Introduction 2 Multi-layered spam detection and management 2 SpamCensor: Marshal s unique heuristic filter 2 URLCensor: Live URL blacklist
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
Spam in Q1 2014. Contents. Fake notifications from mobile applications. Darya Gudkova
Spam in Q1 2014 Darya Gudkova Contents Fake notifications from mobile applications... 1 Hot topics in spam: the Olympic games... 5 Spammer tricks: creating background noise with HTML tags... 6 Statistics...
WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
Phishing Past, Present and Future
White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
About the Junk E-mail Filter
1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,
Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email
: Barracuda Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,
Email Expanded Header: Viewing in Microsoft Outlook
Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds
The Radicati Group, Inc. ...
. The Radicati Group, Inc. 1900 Embarcadero Rd., Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com The Radicati Group, Inc. An Analyst Review of Hotmail Anti-Spam
E-MAIL - Spam Filtering
E-MAIL - Spam Filtering SPAM FILTERING OVERVIEW... USER S GUIDE...... Common Login Errors......... Lists Tab... 5 Profile Tab... 7 Quarantine Tab... 0 LOGGING IN MAIN SCREEN SPAMBLOCKER TABS (LISTS, PROFILE
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
