• Save
Evict the spammers from your inbox
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Evict the spammers from your inbox

  • 351 views
Uploaded on

Evict the spammers from your inbox

Evict the spammers from your inbox

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
351
On Slideshare
351
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. LOGO SafeSpaceOnline Evict the Spammers from Your Inbox
  • 2. LOGOSpam, commonly defined as unsolicited commercialemail, is a powerful advertising channel for manyproducts and services. As a result, spamming hasbecome a profitable business, driven by the low cost ofsending email compared to other direct marketingtechniques. The high return on investment forspammers has resulted in an overwhelming volume ofunwanted messages in personal and business emailboxes. Consider this: Conducting a direct mail campaigncosts an average of $1.39 per person, meaning that aresponse rate of 1 in 14 is necessary just to break evenon a product with a $20 gross profit. Selling the sameitem via unsolicited spam email costs only $0.0004 perperson, meaning that a response rate of 1 in 50,000gets the seller back to break-even; anything above thatis gravy. With profit margins like these, its easy to seewhy spammers will try anything to get past anti spamtechnology to deliver their messages to your inbox. SafeSpaceOnline
  • 3. LOGO Types of Spam Threats The recent onset of fraudulent spam variants such as phishing and spoofing pose an even greater risk than the spam volume clogging email servers. Spammers use techniques such as phishing and spoofing to fool users into opening messages that, at first glance, appear innocuous. SafeSpaceOnline
  • 4. LOGO Phishing Phishing is a specific type of spam message that solicits personal information from the recipient. Phishers use social engineering techniques to fool end users into believing that the message originated from a trusted sender, making these attacks especially dangerous because they often con victims into divulging social security numbers, bank account information or credit card numbers. In one six-month period from November 2003 to May 2004, phishing attacks increased in frequency by 4000%, and the trend continues upward. An example of phishing is an email that appears to come from a bank requesting that users log into their account to update or correct personal information. When the users follow a link embedded in the email, they are redirected to a site that looks and behaves like the expected bank website. However, unbeknownst to the soon-to-be identity theft victims, the site is actually controlled by the scam artists who sent the email; any and all information entered by the victim can now be used in a variety of ways, none of them good. SafeSpaceOnline
  • 5. LOGO Spoofing Spoofing is a deceptive form of spam that hides the domain of the spammer or the spams origination point. Spammers often hijack the domains of well-known businesses or government entities to make spam filters think the communication is coming from a legitimate source. Todays spammers are more crafty than ever before and have begun blending elements of both phishing and spoofing into their messages, further spinning their web of deception. The toxic combination of spoofing and phishing presents a major threat that can trick most anyone into providing personal information to a stranger. SafeSpaceOnline
  • 6. LOGO Toothless Legislation On January 1, 2004, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, or CAN-SPAM Act. While well intentioned, CAN-SPAM has done little or nothing to curb the flow of unwanted email. In fact, an estimated 97% of all spam email sent in 2004 violated the Act, and the United States still dwarfs other nations in terms of the origin of spam, with CipherTrust research revealing that an astonishing 56.77% of all spam comes from U.S.-based IP addresses. While CAN-SPAM was designed to decrease the overall volume of spam, the exact opposite has happened: in 2004, spam accounted for approximately 77% of all email traffic, and phishing attacks continue to increase exponentially, with studies showing an increase of 4000% from November 2003 to May 2004 SafeSpaceOnline
  • 7. LOGO Anti Spam Software for the Desktop The dramatic increase in spam volume has prompted a corresponding surge in stand-alone anti spam software solutions for the desktop, all with varying levels of effectiveness. Some anti spam software uses text filtering to screen incoming messages for known characteristics of spam, while other solutions rely solely on reputation systems that monitor and categorize email senders by IP address according to their sending behavior. Still other anti spam software uses challenge/response filters to block unapproved mail until the sender responds (manually) to a challenge email sent to their email account to verify his or her identity. With so many different methods of filtering spam, no single software- based desktop anti spam solution is capable of effectively stopping spam before it reaches the inbox. The only way to successfully fight spam is to create an anti spam cocktail including reputation services, text filters, constant updates and a host of other best-of-breed spam blocking methods. Just as importantly, an effective anti spam solution should reside at the email gateway, not at the desktop. Without protection at the gateway, mail servers waste massive amounts of bandwidth and storage space processing every message, wanted or not, and end users face the unenviable task of deciding what to do with the countless spam messages that successfully reach them. SafeSpaceOnline
  • 8. LOGO Take a Consolidated Approach to Anti Spam Although it takes a person only a moment to process a message and identify it as spam, it is difficult to automate that human process because no single message characteristic consistently identifies spam. In fact, there are hundreds of different message characteristics that may indicate an email is spam, and an effective anti spam solution must be capable of employing multiple spam detection techniques. In addition to effectively identifying spam, businesses must be assured that legitimate mail is not blocked in error. Even one false positive, or incorrectly blocked email, can have a significant impact on businesses today. Accurate spam blocking requires a combination of tools to examine various message criteria combined with real-time research and intelligence data. By aggregating multiple spam detection technologies like text filtering, reputation services, traffic analysis and other best-of- breed techniques, and placing the solution at the email gateway in a hardened appliance, enterprises can retake control of the inbox SafeSpaceOnline
  • 9. LOGO Read more at SafeSpaceOnline.com Click to edit company slogan .
  • 10. LOGO Read more at SafeSpaceOnline.com Click to edit company slogan .