The war on spam is a battle that no doubt will be fought for years to come. As the spammers continue to send viruses packed with email zombie programs and terrorize unsuspecting victims who open their attachments, we have to wonder when the spamming wars will ever end. Make no mistake, it is a form of terrorism.
There are countless victims of identity fraud that are a result of keystroke loggers and other forms of viruses that send your personal information to the virus writer (aka terrorist). Even if their identity isn't stolen, just think of the panic and terror that victims feel when they open the attachment and their PC starts acting strange. The users may wonder "Did I just infect myself with spyware?" or "Did I just infect my PC with a virus?" or worse, they may wonder "Did I just give the 'keys' to all my confidential information, including all my passwords to the virus writer? Will they steal my identity and will I find strange activity on my credit report?"
The thought of identity theft is scary, indeed 'terrifying' if you think about it. It could be months of worrying if a simple double-click on an attachment resulted in the destruction of your bank account and good name/credit. Even if the virus is relatively harmless, you still may worry for months to come, especially if you aren't technically included to figure out exactly what the virus did to your PC. And if the unthinkable happens - not only will you have to spend time and money fixing your credit, but the stress itself is no picnic. Yes, spammers are terrorists - plain and simple.
I say whenever these spammer terrorists are caught, we skip the whole "due process" thing and ship them to Guantanamo (aka Gitmo) where all terrorists belong.
I bring this topic up because I just received an email (pasted below) discussing how terrorists are now using zombie PCs more often (62%) due to the "stricter" spam border patrols that for example Microsoft has put on its Hotmail servers to block illegal immigrants... err I mean 'spam' from entering Hotmail's servers. Instead, zombie PCs use legal netizen's PCs to send out the illegal terrorists spam since this bypasses Sender ID and Sender Policy Framework (SPF) email authentication spam-blocking techniques.
Where's the Minutemen Civil Defense Corp when you need them? We need Minutemen to patrol the Internet and block spam (especially foreign spam which for me is 90% of my spam) from entering our borders!
Anyway, here's the email I wanted to share...
MX LOGIC REPORTS SPAMMERS CONTINUE TO LEVERAGE SPF AND SENDER ID EMAIL AUTHENTICATION PROTOCOLS
--Zombie PCs Account for 62 Percent of Spam in June; 4 Percent of Unsolicited Commercial Email in 2005 Complies with Federal Anti-Spam Law--
DENVER July 11, 2005 MX Logic, Inc., a leading provider of innovative email defense solutions that ensure email protection and security for businesses, service providers, government organizations, resellers and their customers, today released its latest data on corporate email security. Among the key findings, the company reported that spammers continue to adopt Sender ID and Sender Policy Framework (SPF) email authentication protocols intended to help stop fraudulent email.
In a sample of more than 17.7 million unique email messages that passed through the MX LogicĀ® Threat Center from June 19 through June 25, 2005, MX Logic found that:
9 percent were from domains that had published an SPF record, 84 percent of which were spam sending domains; and,
0.14 percent were from domains that had published a Sender ID record, 83 percent of which were spam sending domains.
Email authentication protocols including SPF, Sender ID, Domain Keys Internet Mail (DKIM) and others are intended to help verify the origins of email at the domain level, making it more difficult for spammers and phishers to stay in business.
"Spammers continue to leverage SPF and Sender ID with the intention of making their messages appear more legitimate and to possibly avoid having their messages delivered with an onscreen notification that a Sender ID record was not found, a method Microsoft recently announced it will use on Hotmail," said Scott Chasin, chief technology officer, MX Logic. "The strength of these protocols is further compromised by the fact that many legitimate senders have yet to adopt either Sender ID or SPF."
Chasin also noted that industry trials of both SPF and Sender ID have raised concerns about the protocols' effectiveness when email messages are forwarded or resent and in their ability to stop forgery of the most common user-visible mail headers. He pointed to a technical paper published by the Messaging Anti-Abuse Working Group, of which MX Logic is a member, which contains the results of more than six months of evaluation of SPF and Sender ID email authentication protocols.
"While we applaud industry efforts to develop email authentication protocols, no domain authentication protocol can guarantee that a message you receive really does come from who you think it comes from," said Chasin. "Additionally, for any domain-based email authentication protocol to be effective, it would have to be embraced by a critical mass of domain name holders. Imposing one protocol without mass adoption could result in the unfair treatment of a large number of senders of legitimate email."
In addition to data related to email authentication, MX Logic also issued the following findings:
Zombie Networks Account for Majority of Spam in June During June, spam sent through zombie PCs accounted for an average of 62 percent of all spam filtered by the MX Logic Threat Center. This compares with 55 percent in May and 44 percent in April.
"The continued proliferation of zombie PCs has levied a heavy cost on ISPs and email end users," Chasin said. "Compromised PCs have resulted in millions of email users being unknowingly blacklisted, often through no fault of their own."
Zombie PCs are neglected, "always-connected" broadband PCs that spammers hijack by installing a spam Trojan. Once infected, these zombie PCs provide worm authors with remote command-and-control spam-distribution capabilities, allowing them to create a legion of zombie computers that can pump out unwanted email and initiate Denial of Service (DoS) attacks.
"To make a real dent in the amount of spam sent globally, efforts must focus on helping service providers reduce outbound messaging abuse by identifying compromised PCs," Chasin said.
One such effort began in May, when the Federal Trade Commission (FTC), along with 35 government partners from over 20 countries, unveiled "Operation Spam Zombies." This international campaign is designed to educate Internet Service Providers (ISPs) and other Internet connectivity providers about hijacked, or zombie, computers that spammers use to flood inboxes.
Only 4 Percent of 2005 Unsolicited Commercial Email Complies with Federal Anti-Spam Law MX Logic also reported that monthly compliance with The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act averaged 4 percent during the first six months of 2005. The findings are based on a survey conducted by the MX Logic Threat Center of more than 250,000 email messages since January.
MX Logic has tracked compliance with the CAN-SPAM Act since the law went into force on Jan. 1, 2004, by examining a random sample of 10,000 unsolicited commercial emails each week. On average, only 3 percent of unsolicited email has complied with CAN-SPAM since the law went into effect. Compliance hit a peak of 7 percent in December 2004 and reached an all-time low of 0.54 percent in July 2004.
"In terms of stopping spam, legislation is a blunt instrument," Chasin said. "Its real value is that it provides enforcement power to ISPs, the FTC, state attorneys general and other government agencies. Consistently low CAN-SPAM compliance underscores the need for further progress in industry cooperation and consensus on email authentication protocols, as well as end-user education."
Media and analysts interested in the latest CAN-SPAM compliance number can find it at http://www.mxlogic.com/news_events/.
Monitoring billions of messages per month for over 4,300 organizations worldwide, the MX Logic Threat Center combines advanced, accurate and up-to-the-minute email defense technology and human-messaging expertise to protect MX Logic customers from spam, viruses, worms, phishing attacks and other email threats.
android apple asterisk at&t blackberry cell phone cisco dell digium e911 facebook fcc google google talk gps im ip-pbx ipad iphone ipod itexpo ITEXPO lync microsoft mobile phone open source outage phone review sip skype sony unified communications verizon video video conferencing voip vonage wireless xbox 360
- Apple (280)
- Bittorrent (2)
- Call Center and CRM (48)
- Computer Hardware (183)
- Computer Software (71)
- Gadgets (650)
- Google (225)
- Home Entertainment (263)
- Internet (173)
- Linux (111)
- Microsoft (376)
- MovableType (48)
- News (187)
- Personal and Humor (118)
- Politics (9)
- Reviews (246)
- Security (2)
- Social Networking (42)
- Sports/Outdoor Technology (9)
- Tablets (32)
- Technology and Science (355)
- Unified Communications (471)
- VoIP (2285)
- Wireless (584)
- p2p (20)
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- December 2004
- November 2004
- October 2004
- September 2004
- August 2004
- July 2004
- June 2004
- May 2004
- April 2004
- March 2004
Featured Videos