About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Spam: the digital epidemic of the XXI century
Monday, 18 October 2004 17:04 EST

10/18/2004. Spam or unsolicited commercial email has become a real epidemic that, as well as slowing down users’ communications, also has a significant financial impact in corporate environments.

According to Spam Filter Software Review, in 2002, in the United States alone, junk mail cost businesses almost 9 billion dollars. What’s more, in 2003, 40 percent of the emails circulating around the Internet were spam and each user received an average of 2,200 spam messages a year.

Apart from that, spam can also cause corporate networks to slow down and increase bandwidth consumption, resulting in a dramatic increase in these figures. Therefore, it is obvious that spam protection, especially in corporate networks, must be given priority.

Spam can also be used as a means of spreading an even more dangerous threat: computer viruses. A spam message could easily include an attachment carrying a virus or a link to an apparently interesting website, from which malicious code can be downloaded without the user realizing. In the most extreme scenario, a virus could even be hiding in the message code.

None of these tactics are new; they have already been used to infect computers. However, just because they are known, it does not make them any less dangerous. In networks with a large number of users, it is not difficult for one of those users to download or run a virus hidden in a spam message, which will then spread across the network.

A basic measure to adopt to prevent spam from getting into users’ mailboxes is to filter email messages. There are a large number of applications that allow network administrators to define rules that will help identify junk emails. They can configure them to filter email messages by subject, key word, domain, IP address of the sender of the message, etc.

However, spam is evolving at the same pace as security systems, and this means that just filtering messages is not enough. Spammers use all kinds of ruses to slip past any obstacles that try to stop them from reaching their target and for this reason, the system used must also intelligently analyze each message, as well as having the capacity to “learn”. This means that it must be able to identify spam messages with minimum administrator intervention.

In companies, correctly identifying spam is not the only problem, but also managing the huge amount of spam messages received every day. Therefore, anti-spam tools must solve this problem. A good solution is to use a computer dedicated to blocking and deleting spam, installed at the connection between the corporate network and the Internet.



Featured Articles

Software application development has only been around since the late 1970s. Compared to other industries and professions, the software industry is still very young. Ever since organizations began to use computers to support their business tasks, the people who create and maintain those “systems” have become more and more sophisticated and specialized.

A new Trojan horse is designed to produce forge Google ads that are formatted to look like legitimate ones. The Trojan attempts to incorporate its ads in Google AdSense publishers program. Once installed, the Trojan horse downloads itself onto the computer and replaces the original ads with its own ads.

According to Burton Group, identity federation can be defined as ‘the agreements, standards and technologies that make identity and entitlements portable’. There are three main federation models - simple (point-to-point), hub and spoke (uni or bi-lateral) and circle of trust (many-to-many).

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter