The Spam Dirty Dozen: Top Spam-Relaying Countries for Q3 2012

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next The Spam Dirty Dozen: Top Spam-Relaying Countries for Q3 2012-6 Next

Brazil – 4.0 percent

Brazil takes fifth place, relaying 4.0 percent of spam mail detected during the third quarter of 2012.

IT security and data protection firm Sophos has published its latest 'Dirty Dozen' report of spam-relaying countries for the third quarter of 2012. Since the previous quarter, India has grown its lead at the top of the hall of shame, and now relays 16.1 percent of all spam captured in SophosLabs’ global network of spam traps.

The U.S., which was once a permanent fixture as the leading superpower in the spam stakes and last topped the table in the same period a year ago, has risen one place since last quarter and now relays one in 15 of all spam emails.

The UK, which has managed to remain out of the top 12 spam-relaying countries for the last four consecutive quarters (having last appeared in April - June 2011), makes a return to the list, in twelfth place.

This slideshow features the top 12 spam-relaying countries for July to September 2012, according to Sophos.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.