SearchSecurity.com

Spam 2.0: New attacks, viruses and prevention strategies

The latest statistics show that 90% of all global email traffic is spam. What's more alarming is the sophistication of spam attacks and viruses -- being essentially on par with commercial-grade products, giving enterprise defenses all they can handle.

It's no wonder the spam problem continues unabated. The proliferation of botnets and profit motives are spurring new spam 2.0 attacks and techniques that are getting through filters and clogging inboxes. Innovative techniques, such as embedding them in PDFs or within images, are tricking spam filters and users alike. While inroads have been made, the war on spam is certainly not over. Instead, new battle lines are being redrawn, and security professionals must stay on top of these emerging tricks and devleop prevention strategies.

   Webcast: Next-generation spam

   Technical article: How to prevent spam bots

   Podcast: Countdown: Top five technologies to help battle the new spam threat

   Quiz: Spam 2.0: New threats and new strategies

   About the instructor

MAIN MENU
Messaging Security School home
Spam 2.0: New threats and new strategies
Managing traffic: Keeping your content where it belongs
The changing threat of email attacks
Defending mobile devices from viruses and spyware
Essential practices for securing mobile devices
Secure instant messaging
Countermeasures for malicious email code
Securing Exchange
This lesson is sponsored by Trend Micro. Download this white paper:
Osterman Research: Guide to Understanding Hosted and Managed Messaging


Webcast: Next-generation spam
Length: 50 minutes
This webcast examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure both structured and unstructured data doesn't leave your organization over email, instant messaging, HTTP or any other communication vehicle. This presentation will consider whether it makes more sense to use an existing gateway product, a managed service or whether a new class of device is required to meet the need.


Technical article: How to prevent spam bots
Keeping your network clear of spam bots is critical not just for your own security but that of others as well. This tip will look at how network administrators can prevent their networks from being hijacked by Trojans and other malware to relay spam to the rest of the Internet.


Podcast: Countdown: Top five technologies to help battle the new spam threat
Spam 2.0 tactics are outwitting current spam technologies, and spam still accounts for as much as 90% of all email, with PDF spam making up 8% of junk email. Fortunately, there are new and creative ways to fight back. This podcast will examine the top five alternative technologies enterprises can use in the battle against spam.


Quiz: Spam 2.0: New threats and new strategies
A five-question multiple-choice quiz to test your understanding of the content presented in this lesson of SearchSecurity.com's Messaging Security School.


About the instructor:

Michael Cobb, CISSP-ISSAP is a renowned security author with more than 10 years of experience in the IT industry and another 16 years of experience in finance. He is the founder and managing director of Cobweb Applications Ltd., a consultancy that offers IT training and support in data security and analysis. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Michael is also a Microsoft Certified Database Administrator and a Microsoft Certified Professional.

26 Nov 2007

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement