Access "Spam blockers losing ground on sophisticated attackers"
This article is part of the June 2008 issue of Five crucial virtualization do's and don'ts
Spam hasn't been "solved"; in fact, the scourge has grown worse as attackers continually trump counter-measures and refine their focus on high-value targets. The war against spam has not come to a swift and just conclusion. Ever since Bill Gates' proclamation in 2004 that spam will be "solved" within two years, the problem has gotten worse, with no light at the end of the tunnel. As with any conflict, it's instructive to understand how and why it started, how it is being fought and what we can expect. Spam started primarily as a marketing vehicle. Sending email to harvested lists was the most cost-effective way to get a message out; a very small percentage of responses to these mass mailings was enough to turn a profit. It wasn't long before spam was used to carry malicious payloads. Ranging from Melissa, I Love You and MyDoom to the most recent scourge, Storm, the email attack is here to stay. The reason is pretty obvious: the attack mechanism remains as profitable as ever. Sophisticated spammers bring traditional direct marketing tactics to the table, ... Access >>>
Premium Content for Free.
Virtualization server security best practices
by Thomas Ptacek
Avoid server virtualization security bad practices with these dos and don'ts. Get info on virtualization products, segmentation, implementation, avoiding malware, and staging, deploying and patching virtual machines, segmentation and implementation.
Product review: Credant Mobile Guardian 6.0
Product review: Klocwork Insight 8.0
Embedded Security Safeguards Laptops
Tech Focus: Secure From Within
Security Awareness Employee Training Essential to Infosec Program
Security awareness training initiatives such as online tutorials, newsletters, MP3s and prizes get the security message across to users.
- Virtualization server security best practices by Thomas Ptacek
Spam blockers losing ground on sophisticated attackers
SPAM Spam hasn't been "solved"; in fact, the scourge has grown worse as attackers continually trump countermeasures and refine their focus on high-value targets.
Product review: Mu-4000 Security Analyzer
Product review: Array Networks SPX2000
Security Services: QualysGuard Security and Compliance Suite
At Your Service
GRC Tools Help Manage Regulations
GOVERNANCE, RISK AND COMPLIANCE We look at three GRC products and the distinct ways these tools can help organizations navigate the complicated regulatory game.
- Spam blockers losing ground on sophisticated attackers
CISOs Must Innovate to Enable Business
Editor's Desk: Be an Enabler
Architect Security and Compliance Programs to Be Complementary
Perspectives: Shake On It
Address Authentication and Transaction Validation Protocols to Stem Identity Theft
Layer8: Tarnishing Good Names
Interview: Financial Services CISO David Pollino
CISO Uses Predictive Analystics to Bolster Risk Management Program
- CISOs Must Innovate to Enable Business
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...