Subscribe free to our newsletters via your
. 24/7 Space News .




INTERNET SPACE
About 90 percent of all email is spam: Cisco
by Staff Writers
San Francisco (AFP) Dec 15, 2008


Junk email referred to as spam accounts for nearly 200 billion messages daily, approximately 90 percent of email worldwide.

Armies of hijacked computers are flooding the world with spam as hackers devise slicker ways to take over unwitting people's machines, according to a Cisco report released Monday.

Virus-infected computers are woven into "botnets" used to attack more machines and to send specious sales pitches to email addresses in low-cost quests to bilk readers out of cash.

"Every year we see threats evolve as criminals discover new ways to exploit people, networks and the Internet," said Cisco chief security researcher Patrick Peterson.

Junk email referred to as spam accounts for nearly 200 billion messages daily, approximately 90 percent of email worldwide, according to a Cisco Annual Security Report.

The United States is the biggest source of spam, accounting for 17.2 percent of the messages. Turkey and Russia ranked second and third, accounting for 9.2 percent and 8 percent of spam respectively, according to Cisco.

This year, botnets were used to inject an array of legitimate Websites with an IFrames malicious code that reroutes visitors to websites that download computer viruses into their machines, according to Cisco.

"The botnet is, in many cases, ground-zero for online criminal threats," Peterson said.

"Using malware to infect someone's computers is an incredibly common mechanism and harnessing them all together is a way they do their click fraud, spam emails, and data stealing."

As computer security vendors such as Cisco get better at protecting machines from hackers and users grow wary of clicking on unsolicited Web links or email attachments, online criminals are turning botnets on Web-based email accounts.

Hackers are "reputation hijacking" by using botnets to figure out weak passwords protecting Web-based email accounts, according to Peterson.

Weak passwords consist of family names, birthdays, home addresses, or other terms considered relatively easy to deduce.

Once access is gained to legitimate email accounts, a plethora of spam messages sent are sent in the owners' names.

.


Related Links
Satellite-based Internet technologies






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








INTERNET SPACE
Google reaffirms commitment to net neutrality
Washington (AFP) Dec 15, 2008
Google on Monday reaffirmed its commitment to "net neutrality" after a newspaper reported the Internet giant was moving away from its support of the principle that all Web traffic should be treated equally. "Google remains strongly committed to the principle of net neutrality, and we will continue to work with policymakers in the years ahead to keep the Internet free and open," Richard Whitt ... read more


INTERNET SPACE
Papua New Guinea tidal waves displace 75,000: UN

Macao's University To Analyze Data From China's Moon Probe

Biggest Full Moon Of The Year

China's First Moon Probe Lowers Orbit For Further Exploration

INTERNET SPACE
Possible Explanation For Migration Of Volcanic Activity On Mars

Phoenix Site On Mars May Be In Dry Climate Cycle Phase

European Mars500 Participants Announced

Important Role Of Groundwater Springs In Shaping Mars

INTERNET SPACE
A New Vision For People In Space

NASA Science Highlights At The AGU Meeting

Space Mission Commander Gives Clues On First Hong Kong Astronaut

India, Russia sign nuclear energy, space deals

INTERNET SPACE
China To Launch New Remote Sensing Satellite

HK, Macao Scientists Expected To Participate In China's Aerospace Project

China's Future Astronauts Will Be Scientists

China Launches Remote Sensing Satellite

INTERNET SPACE
A Station Celebration

NASA Signs Modification To Contract With Russian Space Agency

New Russian Space Freighter Docks With World Orbital Station

ESA wants International Space Station to live longer

INTERNET SPACE
Arianespace's Sixth Ariane 5 Of 2008 Completes Assembly

China Launches Yaogan V Remote-Sensing Satellite

ILS Proton Successfully Launches Ciel II Satellite

Final Payload Integration Begins On Ariane 5's Sixth Flight Of 2008

INTERNET SPACE
Planets Living On The Edge

Watching For Wobbles

Planet Formation Could Lie In Stellar Storms Rather Than Gravitational Instability

Ball Aerospace Completes Environmental Testing For Kepler Mission

INTERNET SPACE
Eliminating Space Debris - The Quest Continues

HP offering aims at penny-pinching IT departments

First Muslim-friendly virtual world goes online

Computer industry celebrates 40 years




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement