Network World - Gmail spam is on the rise. Spammers are using fake Gmail accounts to clog up inboxes, making "Gmail.com" the most abused domain name, according to Commtouch's quarterly Internet Threats Trend Report, released Wednesday.
Only 1% of spam e-mails sent from Gmail addresses are actually from real Gmail accounts, and "this small percentage is likely to represent a mix of spammers and compromised Gmail accounts," Commtouch says.
Overall, "between 5 to 10% of all spam appears to originate from Gmail accounts," Commtouch says. "Addresses are typically faked in order to fool anti-spam systems and to give the impression of a reputable, genuine source."
Spammers are becoming more skilled at using familiar domain names to fool users, and the trend is not limited to Gmail. "Gmail's message style, as well as those of PayPal and Facebook, is frequently used by spammers and phishers as standard templates to prompt action by targets of spam and phishing," Commtouch says.
Throughout the first three months of 2010, 83% of all e-mail traffic was spam, "peaking at nearly 92% near the end of March and bottoming out at 75% at the start of the year." On a daily basis, 305,000 zombie computers - devices taken over by hackers and joined to a botnet - are used to "inflict malicious activity," Commtouch said. Brazil produces the most zombie computers, 14% of the global total.
Not surprisingly, pornographic Web sites are the most likely to be infected with malware. What may be surprising to some Internet users is that porn wasn't the most frequently infected category before last quarter.
"'Pornography' has replaced 'business' as the Web site category most infected with malware," Commtouch said.
Pharmacy spam, advertising Viagra and other types of medications, represented 81% of all spam messages, about the same average as from the previous quarter.
Read more about wide area network in Network World's Wide Area Network section.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts