The Spam Dirty Dozen - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next The Spam Dirty Dozen-9 Next

South Korea places eighth overall with 3.01 percent of all spam messages.

IT security and control firm Sophos has published the latest 'Dirty Dozen' of spam-relaying countries, covering the fourth quarter of 2010. The United States increased its lead at the top spot, and continues to be responsible for nearly one in five junk e-mails – 18.83 percent of all spam messages.

The U.S.'s domination of the list underlines the continuing problem of computers being compromised by hackers in the country, allowing them to be remotely controlled for criminal purposes without the owners' knowledge.

The UK decreased its percentage of total spam output compared to the third quarter last year – from 5 percent to 4.54 percent – however, it remains in fifth place overall.

Sophos notes that, while the same countries continue to dominate in terms of spam output, the nature of the spam being distributed is becoming more malicious. Traditional subject matter such as adverts for pharmaceuticals continue to be a concern, with some 36 million Americans reported to purchase drugs from unlicensed online sellers - but more and more messages are spreading malware and are attempting to phish user names, passwords and personal information.

Sophos warns that there has also been an increase in more focused, targeted e-mail attacks, known as spearphishing. In addition to this, Sophos is continuing to receive an increased number of reports of malicious apps, compromised profiles and unwanted messages spreading across social networks such as Facebook and Twitter.

"Spam is certainly here to stay, however, the motivations and the methods are continuing to change in order to reap the greatest rewards for the spammers," said Graham Cluley, senior technology consultant at Sophos. "What's becoming even more prevalent is the mailing of links to poisoned Web pages – victims are tricked into clicking a link in an e-mail, and then led to a site that attacks their computer with exploits or attempts to implant fake anti-virus software."

More Slideshows:

The Top Six Cloud Computing Pitfalls to Avoid Cloud computing has the potential to offer dramatic operational efficiency and cost savings, but when improperly managed it can have disastrous results.

10 Steps to Increasing Data Center Efficiency and Availability A systematic approach to building data center infrastructure management.

10 Best Practices for Developing a Global Web Strategy Best practices organizations often miss when developing global Web portals.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.