The State of Spam A Monthly Report December Generated by Symantec Messaging and Web Security
|
|
|
- Eustace Glenn
- 10 years ago
- Views:
Transcription
1 The State of Spam A Monthly Report December 2007 Generated by Symantec Messaging and Web Security
2 Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Charles Var PR Contact Contributors Kelly Conley Manager ESG Joseph Long Security Response Lead Niall O Reilly Security Response Technician Robert Vivas Sr Security Response Lead Amanda Grady Customer Response Analyst Antispam Engineering Shravan Shashikant Pr. Business Intelligence Analyst Antispam Engineering Sooz Thomas Security Response Technician Trevor Young Supervisor Security Response Joanne Mulcahy Manager ESG Sammy Chu Security Response Technician Kevin Yu Security Response Lead Takako Yoshida Customer Response Analyst Antispam Engineering Paul O Hagan Security Response Lead Francisco Pardo Security Response Technician
3 Monthly Spam Landscape Tis the season to be jolly, but this month s spam levels brought little cheer to anti-spam analysts. Overall spam levels continued to increase, accounting for nearly three out of four s in November. To put that growth trend into perspective, in May 2007 spam accounted for approximately 64 percent of all traffic. Highlights from this month included: Let the Olympic Spams Begin: Despite the summer games being more than 9 months away, Symantec has started seeing the first examples of spam connected to the 2008 Olympics in Beijing, China (See Page 9) Britney, Lindsay, and Donny Osmond Headline Meds Spam: Gossip headlines concerning celebrities being used in meds spam (see page 10) Spammers Winter Harvest: Symantec blocked an estimated 35 million blank s sent by spammers as part of a suspected harvesting campaign to find valid addresses for spam mailing lists (see page 10) Spammers Exploit Missing Child: As the search continues for the British child Madeleine McCann, one unscrupulous spammer tries to disguise a virus hosting site in spam s with a link to the authentic FindMadeleine.com site. (See page 11) Fraud and Scams Continue to Rise: These categories accounted for 19% of all spam in November (up from 18% in October and 13% in September) Seasonal Campaigns: - Penny Stocks Use Thanksgiving Holiday Captions in Subject Line - Snowball Spam Fight - Christmas Freebie Offer - The Best Christmas Present Ever A Winning Lottery Ticket Special Spotlight: The Resurgence of Spam 2007 in Review While Bill Gates 2004 prediction that spam would be eradicated within two years clearly missed the mark, few expected spam s extraordinary resurgence in Since 2006, spam levels have steadily climbed from 56% of all to an all-time high of 72% of in the most recent month s report. Several spam firsts were also marked in 2007, including usage of MP3s and videos and Google alerts and searches. (See more 2007 trends and highlights on page 16) 1
4 Percentages of Identified as Spam Defined: Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when scanned at the mail gateway. This metric represents SMTP layer filtering and does not include the volumes of detected at the network layer A trend line has been added to demonstrate a 7-day moving average
5 Global Spam Categories Defined: Spam category data is collected from classifications on messages passing through the Symantec Probe Network. Global Category Count inancial Adult raud 7 ealth Scams 2 Internet Products 27 Leisure 3
6 Category Definitions Product attacks offering or advertising general goods and services. Examples: devices, investigation services, clothing, makeup Adult attacks containing or referring to products or services intended for persons above the age of 18, often offensive or inappropriate. Examples: porn, personal ads, relationship advice Financial attacks that contain references or offers related to money, the stock market or other financial opportunities. Examples: investments, credit reports, real estate, loans Scams attacks recognized as fraudulent, intentionally misguiding, or known to result in fraudulent activity on the part of the sender. Examples: Nigerian investment, pyramid schemes, chain letters Health attacks offering or advertising health-related products and services. Examples: pharmaceuticals, medical treatments, herbal remedies Fraud attacks that appear to be from a well-known company, but are not. Also known as brand spoofing or phishing, these messages are often used to trick users into revealing personal information such as address, financial information and passwords. Examples: account notification, credit card verification, billing updates Leisure attacks offering or advertising prizes, awards, or discounted leisure activities. Examples: vacation offers, online casinos, games Internet attacks specifically offering or advertising Internet or computer-related goods and services. Examples: web hosting, web design, spamware Political Messages advertising a political candidate s campaign, offers to donate money to a political party or political cause, offers for products related to a political figure/campaign, etc. Examples: political party, elections, donations 4
7 Regions of Origin Defined: Region of origin represents the percentage of messages reported coming from each of the following regions: North America, South America, Europe, Australia/Oceania, Asia and Africa a rica asia australia oceania europe north america south america 5
8 Percent Image Spam Defined: The total number of image spam messages observed as a percentage of all spam observed A trend line has been added to demonstrate a 7-day moving average. 6
9 Let the Olympics-related Spam Begin Symantec has recently seen a scam purporting to be from the China National Offshore Oil Corporation that makes claims of winning money and a trip to the Beijing Olympics in The looks like the usual Winning Notification lottery s that are all too common. However, the twist is that not only do you win money, but you also win a trip to the 2008 Olympics. This is the first scam that Symantec has seen that targets the coming popularity of the 2008 Olympics in Beijing. In 2004, Olympics-related spam increased steadily in volume from the beginning of the year through mid-summer, and this new scam is likely a signal of more Olympics-related spam to come. The China National Oil Corporation is currently a hot stock market pick and owns a certain portion of valuable crude oil worldwide. By utilizing this known company to promote a free trip to the Olympics, the scammer is looking to generate a lot of interest on this offer. And what does the spammer hope to receive in return? Valuable personal information. Here is a sample of one of the spam s: The fact that the company this scam is purportedly coming from is a hot stock market pick right now, combined with winning money and a free trip to the Olympics, is bound to incite interest amongst recipients. This is a classic example of enticement. Scammers that pretend to come from a well known source immediately ease the recipient s doubts using the known factor. Then, they offer up free goods. In this case, the free goods consist not only of money but also coveted Olympics tickets. 7
10 Britney, Lindsay and Donny Osmond Headline Meds Spam It seems that Spammers will do almost anything to try and entice users to open spam s. A recent rush of pharmaceutical spam subject lines has included gossip headlines concerning some of the most high profile celebrities. The body of the spam message consists of plain text format with randomized Viagra product offering domains. The following are a few subject header examples. Subject: Kevin s Flight with the Angels Subject: Lindsay Lohan Digs Fergie s Handbags Subject: Britney Spears Shops at Bel Bambin Subject: Britney Spears Under LAPD Investigation Subject: Donny Osmond Backstage with Dancing Subject: Kevin Escorts Victoria s Secret Angels To L\.A Subject: Brooke Burke and David Charvet Baby News Subject: Beyonce billboard upsets Vegas residents Directory Harvest Attacks Continue to Blight Spam Landscape. November saw millions of blank messages being sent out as part of a concerted directory harvest attack. These messages with an empty subject and body seem to be of no obvious purpose for a typical end user so why do they exist? During a directory harvest campaign, spammers bombard servers with guessed addresses. The addresses that are not rejected are assumed to be valid and added to spam lists for a subsequent spam attack. Symantec Antispam filters blocked well over 35 million of these messages in November. 8
11 Spam Monthly Report, December 2007 Spammers Exploit Missing Child An attack this month preyed on the public interest in the story of the missing British child, Madeleine McCann. The contained a link to which redirected to The second site is designed to look similar to the official McCann family site, however, it actually is set up to distribute a virus. The site also contains an unauthorized use of the Symantec logo and a number of Google ads for anti-virus products. It should be noted that although the spam also contains a link to the legitimate findmadeliene.com site, there is no connection between the spammers and the genuine site. 9
12 Spam Monthly Report, December 2007 Spammers Sell Databases. Symantec has for some time now observed spam s offering large databases with addresses and other personal information for sale, with the promise that it is the best way to attract new business. Recenty, Symantec has noted some of these examples are written in Spanish and Italian, possibly in an attempt to attract new business. 10
13 Seasonal Spam Attacks Penny Stocks Use Thanksgiving Holiday Captions in Subject Line Penny stock spammers have recently taken advantage of the Thanksgiving holidays in the U.S. by using common personal Thanksgiving-related words in the subject s. The following are a handful of sample subject lines that have been seen in millions of spam messages, which are now being blocked by Symantec Brightmail Antispam Solution. Subject: Be thankful on Monday Subject: Got your fill of turkey this weekend? Subject: The holiday report Subject: Is there anymore stuffing Subject: Make sure you got the gravy cause here is the main course Many of the subject lines are intended to trick end users into clicking into the . Replica Products a Favorite for Spammers this Holiday Season. Products such as replica watches and handbags have long been a favorite for spammers. As December unfolds, Symantec has observed that some spammers are using holiday keywords in the subject lines of some of their attacks. Some examples of the seasonal spam subject lines include: Subject: The best Christmas gifts for your nearest and dearest Subject: Posh accessories at reduced prices for Christmas!)$ Subject: Find the most luxurious Christmas presents Subject: The most attractive offers for Christmas shopping! Subject: Have you already bought all Christmas gifts Subject: Christmas sale of awesome watches, pens, and lighters Subject: Surprise your beloved one with the most elegant Christmas present 11
14 Spam Monthly Report, December 2007 Spam Begins to Snowball Chain s have always been a source of annoyance for many. This winter season, Symantec has observed some s with subjects like Wonderful News! and Guess What?! Upon analysing this message, a gif image appears of a sneaky character that proceeds to throw a snowball. While this might seem like harmless fun, it s far from it as addresses can be harvested through the use of the snowball image. Each time the is read, a request is sent to the server hosting the image and the user s address is stored in a log file on the spammer s server. This would appear in the log as: domain.com. So be careful when forwarding such s to friends and family because even if your intention is harmless you may actually be handing their address to a spammer. 12
15 Christmas Freebie Anyone? Feeling the financial pinch this holiday season? Fancy a free gift worth 250 at Marks & Spencer s department store? The following example shows a spammer using a well known UK brand to trick end users. The Subject titled Christmas Freebie reads: Hey, For a limited time only you can claim a FREE 250 Gift Card from Marks & Spencers! Upon clicking the link to receive the gift card the user will be told Sorry this offer is not available in your area. You ll be redirected shortly. The user then finds they have been duped there is no 250 gift, just a bogus chat site at the end of the link. Ba Humbug! 13
16 Spam Monthly Report, December 2007 Seasonal Lotto Scams In a scam targeted at UK end users, spammers have updated a lottery spam to a Christmas Bonanza special. The premise behind this scam attack remains the same as other lottery scam s (i.e in order to claim your prize, send personal information to a typically bogus entity or sender). 14
17 Special Spotlight: 2007 Year in Review Bill Gates 2004 prediction of spam being eradicated within two years definitely missed the mark. But no one could have predicted the dramatic resurgence of spam in 2007, peaking at 72% of all traffic. Image spam was on the forefront of this resurgence, causing anti-spam vendors to come up with new techniques to detect and block these new attacks. And the creative tactics didn t stop there. Spammers launched several spam firsts throughout the year, including tactics using bot herders, audio and video files, and Google alerts and searches. They also explored different protocols and platforms such as Instant Messaging, SMS and even multi-player online games. And while spammers proved to be more evasive and sophisticated than ever, those on the anti-spam front increased their efforts to crack down on spam. There was the FBI s Bot Roast program, the SEC s Operation Spamalot, ISPs sharing more information, and anti-spam vendors deploying the latest blocking technologies. Despite all the industry discussion about data loss prevention, virtualization and IT risk management, 2007 was still a headline year for spam. Here are some notable facts and events that stand out: Spam Growth Trend (Average percentage of all traffic): July-Dec 2005: 50% Jan June 2006: 54% July-Dec 2006: 59% Jan-Nov 2007: 70+% Spam Firsts in 2007: Teaming with botherders (Storm worm/ Peacomm Trojan) Audio (MP3) and video use (i.e. YouTube) Leveraging Google Alerts and Search Use of different protocols/platforms (e.g. IM, SMS, and multi-player online games) Events: FBI Bot Roast SEC Operation Spamalot ISP Information Sharing Broad Trends: Image Spam (Mr. Ransom, Newsletter Spam, etc): Rapid increase, continual evolution, and steady decline to a small overall fraction Attachment Spam (PDFs, Zip files, etc.): Burst onto the scene with rapid increase, some expected evolution, rapid decline to nearly nothing Pump-and-Dump Stock Scam Spam: Remained one of the top categories of spam (21% 1H07, 30% decline from 2H06 attributed to SEC operation); continual evolution New Social Engineering (Beijing Olympics, California Wildfires, Saddam Hussein Execution, etc.) Fraud and Scam Spam: Steady increase and evolution (i.e. twists to 419 scam, Ecards, etc.) 15
The State of Spam A Monthly Report October 2007. Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report October 2007 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Charles Var
The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report August 2008 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Joseph Long
How to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com
Fighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
Spam in Q1 2014. Contents. Fake notifications from mobile applications. Darya Gudkova
Spam in Q1 2014 Darya Gudkova Contents Fake notifications from mobile applications... 1 Hot topics in spam: the Olympic games... 5 Spammer tricks: creating background noise with HTML tags... 6 Statistics...
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
CREATING YOUR ONLINE PRESENCE
CREATING YOUR ONLINE PRESENCE Congratulations on signing up for your webhosting package, you ve just completed the first and most important step in establishing your online presence. There are just a few
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your
Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
Email Expanded Header: Viewing in Microsoft Outlook
Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds
Quarterly Report: Symantec Intelligence Quarterly
Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001
WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
Phishing Past, Present and Future
White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
Avoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
Customer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
User guide Business Internet e-mail features
User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Information Security Field Guide to Identifying Phishing and Scams
Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting
GUIDE TO EMAIL MARKETING
GUIDE TO EMAIL MARKETING Using e-mail marketing to communicate with your customers and promote your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses
White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
The Ultimate Facebook. Marketing Guide. How to get more leads with Facebook Marketing. yinc. [email protected]
The Ultimate Facebook Marketing Guide How to get more leads with Facebook Marketing 1 [email protected] The Ultimate Facebook Marketing Guide. How to profit from Facebook Ads and Achieve Greatness. In
A TASTE OF HTTP BOTNETS
Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.
WEB HOSTING AGREEMENT AND TERMS OF SERVICE Shortcut Solutions, llc. --June 2007-- Acceptable Use Policy and Web Hosting Terms of Service Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms
How to Spot and Combat a Phishing Attack Webinar
How to Spot and Combat a Phishing Attack Webinar October 20 th, 2015 Kevin Patel Sr Director of Information Security, Compliance & IT Risk Mgmt [email protected] Agenda 1) National Cyber Security
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
INSIDE. Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization. Symantec Online Fraud Management
Symantec Online Fraud Management WHITE PAPER Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization INSIDE New online threats Impacts on customer trust and brand confidence
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
