Network World - Gmail spam is on the rise. Spammers are using fake Gmail accounts to clog up inboxes, making "Gmail.com" the most abused domain name, according to Commtouch's quarterly Internet Threats Trend Report, released Wednesday.
Only 1% of spam e-mails sent from Gmail addresses are actually from real Gmail accounts, and "this small percentage is likely to represent a mix of spammers and compromised Gmail accounts," Commtouch says.
Overall, "between 5 to 10% of all spam appears to originate from Gmail accounts," Commtouch says. "Addresses are typically faked in order to fool anti-spam systems and to give the impression of a reputable, genuine source."
Spammers are becoming more skilled at using familiar domain names to fool users, and the trend is not limited to Gmail. "Gmail's message style, as well as those of PayPal and Facebook, is frequently used by spammers and phishers as standard templates to prompt action by targets of spam and phishing," Commtouch says.
Throughout the first three months of 2010, 83% of all e-mail traffic was spam, "peaking at nearly 92% near the end of March and bottoming out at 75% at the start of the year." On a daily basis, 305,000 zombie computers - devices taken over by hackers and joined to a botnet - are used to "inflict malicious activity," Commtouch said. Brazil produces the most zombie computers, 14% of the global total.
Not surprisingly, pornographic Web sites are the most likely to be infected with malware. What may be surprising to some Internet users is that porn wasn't the most frequently infected category before last quarter.
"'Pornography' has replaced 'business' as the Web site category most infected with malware," Commtouch said.
Pharmacy spam, advertising Viagra and other types of medications, represented 81% of all spam messages, about the same average as from the previous quarter.
Read more about wide area network in Network World's Wide Area Network section.
- The Pivotal Big Data Suite- Reducing the Risks of Big Data The explosion of big data and the rapid evolution of big data tools and technologies is challenging IT to meet the demands of...
- A Survival Guide for Data in the Wild All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices...
- Transforming Security: Designing a State-of-the-Art Extended Team The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!