The latest statistics show that 90% of all global email traffic is spam. What's more alarming is the sophistication of spam attacks and viruses -- being essentially on par with commercial-grade products, giving enterprise defenses all they can handle.
It's no wonder the spam problem continues unabated. The proliferation of botnets and profit motives are spurring new spam 2.0 attacks and techniques that are getting through filters and clogging inboxes. Innovative techniques, such as embedding them in PDFs or within images, are tricking spam filters and users alike. While inroads have been made, the war on spam is certainly not over. Instead, new battle lines are being redrawn, and security professionals must stay on top of these emerging tricks and devleop prevention strategies.
|
MAIN MENU |
| Messaging Security School home | |
| Spam 2.0: New threats and new strategies | |
| Managing traffic: Keeping your content where it belongs | |
| The changing threat of email attacks | |
| Defending mobile devices from viruses and spyware | |
| Essential practices for securing mobile devices | |
| Secure instant messaging | |
| Countermeasures for malicious email code | |
| Securing Exchange |
Osterman Research: Guide to Understanding Hosted and Managed Messaging |
Webcast: Next-generation spam
Length: 50 minutes
This webcast examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure both structured and unstructured data doesn't leave your organization over email, instant messaging, HTTP or any other communication vehicle. This presentation will consider whether it makes more sense to use an existing gateway product, a managed service or whether a new class of device is required to meet the need.
Technical article: How to prevent spam bots
Keeping your network clear of spam bots is critical not just for your own security but that of others as well. This tip will look at how network administrators can prevent their networks from being hijacked by Trojans and other malware to relay spam to the rest of the Internet.
Podcast: Countdown: Top five technologies to help battle the new spam threat
Spam 2.0 tactics are outwitting current spam technologies, and spam still accounts for as much as 90% of all email, with PDF spam making up 8% of junk email. Fortunately, there are new and creative ways to fight back. This podcast will examine the top five alternative technologies enterprises can use in the battle against spam.
Quiz: Spam 2.0: New threats and new strategies
A five-question multiple-choice quiz to test your understanding of the content presented in this lesson of SearchSecurity.com's Messaging Security School.
About the instructor:
Michael Cobb, CISSP-ISSAP is a renowned security author with more than 10 years of experience in the IT industry and another 16 years of experience in finance. He is the founder and managing director of Cobweb Applications Ltd., a consultancy that offers IT training and support in data security and analysis. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Michael is also a Microsoft Certified Database Administrator and a Microsoft Certified Professional.
![]()
![]()
![]()
This was first published in November 2007
Security Management Strategies for the CIO
The latest statistics show that 90% of all global email traffic is spam. What's more alarming is the sophistication of spam attacks and viruses -- being essentially on par with commercial-grade products, giving enterprise defenses all they can handle.
Join the conversationComment
Share
Comments
Results
Contribute to the conversation