Network World - Gmail spam is on the rise. Spammers are using fake Gmail accounts to clog up inboxes, making "Gmail.com" the most abused domain name, according to Commtouch's quarterly Internet Threats Trend Report, released Wednesday.
Only 1% of spam e-mails sent from Gmail addresses are actually from real Gmail accounts, and "this small percentage is likely to represent a mix of spammers and compromised Gmail accounts," Commtouch says.
Overall, "between 5 to 10% of all spam appears to originate from Gmail accounts," Commtouch says. "Addresses are typically faked in order to fool anti-spam systems and to give the impression of a reputable, genuine source."
Spammers are becoming more skilled at using familiar domain names to fool users, and the trend is not limited to Gmail. "Gmail's message style, as well as those of PayPal and Facebook, is frequently used by spammers and phishers as standard templates to prompt action by targets of spam and phishing," Commtouch says.
Throughout the first three months of 2010, 83% of all e-mail traffic was spam, "peaking at nearly 92% near the end of March and bottoming out at 75% at the start of the year." On a daily basis, 305,000 zombie computers - devices taken over by hackers and joined to a botnet - are used to "inflict malicious activity," Commtouch said. Brazil produces the most zombie computers, 14% of the global total.
Not surprisingly, pornographic Web sites are the most likely to be infected with malware. What may be surprising to some Internet users is that porn wasn't the most frequently infected category before last quarter.
"'Pornography' has replaced 'business' as the Web site category most infected with malware," Commtouch said.
Pharmacy spam, advertising Viagra and other types of medications, represented 81% of all spam messages, about the same average as from the previous quarter.
Read more about wide area network in Network World's Wide Area Network section.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts