The Spam Dirty Dozen

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14
Previous Next

Click through for the top 12 spam-relaying countries for the fourth quarter of 2010, as reported by Sophos.

IT security and control firm Sophos has published the latest 'Dirty Dozen' of spam-relaying countries, covering the fourth quarter of 2010. The United States increased its lead at the top spot, and continues to be responsible for nearly one in five junk e-mails – 18.83 percent of all spam messages.

The U.S.'s domination of the list underlines the continuing problem of computers being compromised by hackers in the country, allowing them to be remotely controlled for criminal purposes without the owners' knowledge.

The UK decreased its percentage of total spam output compared to the third quarter last year – from 5 percent to 4.54 percent – however, it remains in fifth place overall.

Sophos notes that, while the same countries continue to dominate in terms of spam output, the nature of the spam being distributed is becoming more malicious. Traditional subject matter such as adverts for pharmaceuticals continue to be a concern, with some 36 million Americans reported to purchase drugs from unlicensed online sellers - but more and more messages are spreading malware and are attempting to phish user names, passwords and personal information.

Sophos warns that there has also been an increase in more focused, targeted e-mail attacks, known as spearphishing. In addition to this, Sophos is continuing to receive an increased number of reports of malicious apps, compromised profiles and unwanted messages spreading across social networks such as Facebook and Twitter.

"Spam is certainly here to stay, however, the motivations and the methods are continuing to change in order to reap the greatest rewards for the spammers," said Graham Cluley, senior technology consultant at Sophos. "What's becoming even more prevalent is the mailing of links to poisoned Web pages – victims are tricked into clicking a link in an e-mail, and then led to a site that attacks their computer with exploits or attempts to implant fake anti-virus software."

More Slideshows:


The Top Six Cloud Computing Pitfalls to Avoid Cloud computing has the potential to offer dramatic operational efficiency and cost savings, but when improperly managed it can have disastrous results.

10 Steps to Increasing Data Center Efficiency and Availability A systematic approach to building data center infrastructure management.


10 Best Practices for Developing a Global Web Strategy Best practices organizations often miss when developing global Web portals.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security49-190x128 Using Tokenization for Superior Data Security

With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security. ...  More >>

SurfWatch2014Q3IT0x IT Industry Shellshocked in Q3: How to Plan for What's Next

Making the right investments can minimize the cyber risks your organization faces, but this requires looking at the complete picture and not just a few pieces. ...  More >>

Security48-290x195 Five Myths Holding Your Security Program Back

In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.