The document summarizes spam and anti-spam solutions. It discusses spam from the perspective of a spammer, including their targets, paths, and content. It also describes the spam ecosystem and economics, involving tools providers, spammers, phishing hosts, botnet owners, and target harvesters. Finally, it discusses technological and legal anti-spam solutions and their challenges.
The document provides an overview of a study on user-created content (UCC). It includes:
- An introduction describing the objectives, scope and methodology of the study which analyzed UCC developments in Europe, US, Japan, and South Korea through 50 case studies and 55 interviews.
- A table of contents and sections covering access issues regarding broadband networks and UCC growth, business models of UCC platforms, the role of users as producers versus professional content, and legal and policy issues regarding self-regulation.
- Lists of the 50 case studies analyzed and 55 interviews conducted as part of the methodology.
The document serves as a support document for a workshop to present and validate the study's major findings
The document provides background information about Benjamin Joffe, the CEO of Plus Eight Star, a social media startup based in Singapore. Joffe has over 10 years of experience researching social networks and virtual worlds in Asia, including in China, Japan, and Korea. He has advised several gaming companies on the Asian market. The document discusses key topics about gaming and the Asian market, including the challenges of treating "Asia" as a single market, differences between China, Japan, and Korea, and the size and growth of the digital goods and currencies market in Asia.
We are going to build a website for a building called Artemesia One that will host music events and art shows. The document provides tips for optimizing the website and content for search engines by including keywords like band names, album names, song names, performance dates and locations, interviews, and social media links in photos, videos, and other uploads to help fans discover the band online. It also recommends using a unique and secure username and password for the website.
How and why you should spend money on facebook.Anyssa Jane
This document discusses strategies for businesses to spend money on Facebook advertising and engagement. It outlines key reasons for businesses to have a Facebook presence, including reaching millennials and local customers. It provides tips for generating leads through Facebook, such as using calls-to-action and targeted advertising. The document also explains how to set objectives and metrics for Facebook campaigns, including increasing page likes, clicks to a website, and video views. Overall, it promotes integrating Facebook into marketing strategies and testing different post types and promotions.
The African tulip is an exotic flower. It is native to tropical areas of Africa and has large, colorful blooms resembling tulips. Despite its name, it is not actually a type of tulip but rather belongs to the genus Haemanthus.
The document provides an overview of a study on user-created content (UCC). It includes:
- An introduction describing the objectives, scope and methodology of the study which analyzed UCC developments in Europe, US, Japan, and South Korea through 50 case studies and 55 interviews.
- A table of contents and sections covering access issues regarding broadband networks and UCC growth, business models of UCC platforms, the role of users as producers versus professional content, and legal and policy issues regarding self-regulation.
- Lists of the 50 case studies analyzed and 55 interviews conducted as part of the methodology.
The document serves as a support document for a workshop to present and validate the study's major findings
The document provides background information about Benjamin Joffe, the CEO of Plus Eight Star, a social media startup based in Singapore. Joffe has over 10 years of experience researching social networks and virtual worlds in Asia, including in China, Japan, and Korea. He has advised several gaming companies on the Asian market. The document discusses key topics about gaming and the Asian market, including the challenges of treating "Asia" as a single market, differences between China, Japan, and Korea, and the size and growth of the digital goods and currencies market in Asia.
We are going to build a website for a building called Artemesia One that will host music events and art shows. The document provides tips for optimizing the website and content for search engines by including keywords like band names, album names, song names, performance dates and locations, interviews, and social media links in photos, videos, and other uploads to help fans discover the band online. It also recommends using a unique and secure username and password for the website.
How and why you should spend money on facebook.Anyssa Jane
This document discusses strategies for businesses to spend money on Facebook advertising and engagement. It outlines key reasons for businesses to have a Facebook presence, including reaching millennials and local customers. It provides tips for generating leads through Facebook, such as using calls-to-action and targeted advertising. The document also explains how to set objectives and metrics for Facebook campaigns, including increasing page likes, clicks to a website, and video views. Overall, it promotes integrating Facebook into marketing strategies and testing different post types and promotions.
The African tulip is an exotic flower. It is native to tropical areas of Africa and has large, colorful blooms resembling tulips. Despite its name, it is not actually a type of tulip but rather belongs to the genus Haemanthus.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document discusses how a band's album poster uses, develops, and challenges conventions of real media products. It uses conventions by featuring a recurring piano image and including standard information like release date and names. It develops conventions by making the piano, not the band members, the main focus. It challenges conventions by including a large amount of text, as low-profile bands need more promotional content than just images of recognizable artists.
This document provides an overview of formulas, functions, and formatting in Microsoft Excel 2010. It outlines objectives such as entering formulas using the keyboard or point mode, applying functions like AVERAGE, MAX, and MIN, and formatting elements such as conditional formatting, dates, and numbers. The document also describes projects involving worksheets with formulas and functions and provides step-by-step instructions for various formula, function, and formatting tasks in Excel.
K.S. Dattatreya has over 35 years of experience in healthcare operations, marketing, and quality accreditation. He is currently the Facility Director at Narayana Hrudayalaya Hospital in Bangalore, where he is responsible for overseeing multiple hospitals. Previously, he held leadership roles such as COO, VP of Marketing, and GM of various hospitals and healthcare companies. He has extensive expertise in launching new facilities, implementing processes, and achieving quality certifications like ISO and NABH.
Noor Dance Company is a Middle Eastern dance duo consisting of Maki and Negma. They offer 40 minute shows featuring various styles of Middle Eastern dance such as belly dancing, sword dancing, and dances from Egypt, Lebanon, and the Gulf region. Both dancers have extensive professional experience performing internationally and locally. They are available for events like weddings, parties, and corporate functions at competitive rates.
Deforestation without proper planning endangers species and increases the risk of extinction. Polluted beaches continuously kill more fish every passing minute. Disrespecting nature will ultimately harm both animals and humans over time due to environmental damage.
Vertebrates have backbones, spinal cords, and internal skeletons, while invertebrates lack these features. Some examples of invertebrates provided are worms, sponges, jellyfish, sea anemones, coral, flatworms, roundworms, earthworms, snails, squid, crustaceans, arachnids, insects, millipedes, and centipedes. Each group is described in one to three sentences regarding their defining characteristics and habitats.
Прэзентацыя прысвечана 10-й гадавіне з дня смерці народнага пісьменніка Беларусі Васіля Быкава і адлюстроўвае асноўныя вехі у жыцці і творчасці пісьменніка.
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...Gianluca Stringhini
Unsolicited bulk email, or spam, accounts for more than 90% of worldwide email traffic. The underground economy behind email spam is prosperous, and involves parties located in many parts of the world. Nowadays, most spam is sent by botnets, which are large networks of compromised computers that act under the control of a single entity, called a botmaster. Security researchers have entered an arms race with spammers and botmasters. The goal of researchers is to secure networks and prevent malicious operations from happening, while the goal of cybercriminals is to keep their business up and running.
In this talk I will analyze the outcome of this arms race. On one side, I will talk about the different levels of sophistication the botmasters developed to make their network resilient to take down attempts. On the research side, I will analyze the approaches proposed to prevent machines from being infected, identifying compromised ones, and disrupting command and control structures. In particular, I will focus on the shortcomings of previous approaches, as well as open problems in the area and the areas that have not been studied yet.
Volume of Threat: The AV update deployment bottleneckAnthony Arrott
The document discusses the increasing volume of malware and how it is overwhelming traditional antivirus update systems. It presents data showing exponential growth in new malware samples identified each year. This increase in malware is leading to more antivirus pattern files and updates that are straining current deployment methods. The document proposes moving to a cloud-based architecture for antivirus pattern and software updates as a powerful new layer of defense that can help address these challenges.
This document discusses emerging mobile data threats and security challenges. It provides examples of major cyber attacks from 2011 targeting governments and financial institutions. These attacks show an increase in advanced threats and the need to strengthen security perimeters as networks become more open. The document also highlights growing mobile malware risks and increasing malware dedicated to data theft. It introduces Kaspersky's Open Space Security product line for comprehensive protection across complex networks and endpoints.
This document discusses the democratization of information technology and the increasing accessibility of cloud computing resources over time. It notes several conferences and publications from 2008 to 2010 focusing on the growth of cloud computing and its impact on web businesses and performance. The document suggests that IT is becoming more accessible to everyone through clouds.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document discusses how a band's album poster uses, develops, and challenges conventions of real media products. It uses conventions by featuring a recurring piano image and including standard information like release date and names. It develops conventions by making the piano, not the band members, the main focus. It challenges conventions by including a large amount of text, as low-profile bands need more promotional content than just images of recognizable artists.
This document provides an overview of formulas, functions, and formatting in Microsoft Excel 2010. It outlines objectives such as entering formulas using the keyboard or point mode, applying functions like AVERAGE, MAX, and MIN, and formatting elements such as conditional formatting, dates, and numbers. The document also describes projects involving worksheets with formulas and functions and provides step-by-step instructions for various formula, function, and formatting tasks in Excel.
K.S. Dattatreya has over 35 years of experience in healthcare operations, marketing, and quality accreditation. He is currently the Facility Director at Narayana Hrudayalaya Hospital in Bangalore, where he is responsible for overseeing multiple hospitals. Previously, he held leadership roles such as COO, VP of Marketing, and GM of various hospitals and healthcare companies. He has extensive expertise in launching new facilities, implementing processes, and achieving quality certifications like ISO and NABH.
Noor Dance Company is a Middle Eastern dance duo consisting of Maki and Negma. They offer 40 minute shows featuring various styles of Middle Eastern dance such as belly dancing, sword dancing, and dances from Egypt, Lebanon, and the Gulf region. Both dancers have extensive professional experience performing internationally and locally. They are available for events like weddings, parties, and corporate functions at competitive rates.
Deforestation without proper planning endangers species and increases the risk of extinction. Polluted beaches continuously kill more fish every passing minute. Disrespecting nature will ultimately harm both animals and humans over time due to environmental damage.
Vertebrates have backbones, spinal cords, and internal skeletons, while invertebrates lack these features. Some examples of invertebrates provided are worms, sponges, jellyfish, sea anemones, coral, flatworms, roundworms, earthworms, snails, squid, crustaceans, arachnids, insects, millipedes, and centipedes. Each group is described in one to three sentences regarding their defining characteristics and habitats.
Прэзентацыя прысвечана 10-й гадавіне з дня смерці народнага пісьменніка Беларусі Васіля Быкава і адлюстроўвае асноўныя вехі у жыцці і творчасці пісьменніка.
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...Gianluca Stringhini
Unsolicited bulk email, or spam, accounts for more than 90% of worldwide email traffic. The underground economy behind email spam is prosperous, and involves parties located in many parts of the world. Nowadays, most spam is sent by botnets, which are large networks of compromised computers that act under the control of a single entity, called a botmaster. Security researchers have entered an arms race with spammers and botmasters. The goal of researchers is to secure networks and prevent malicious operations from happening, while the goal of cybercriminals is to keep their business up and running.
In this talk I will analyze the outcome of this arms race. On one side, I will talk about the different levels of sophistication the botmasters developed to make their network resilient to take down attempts. On the research side, I will analyze the approaches proposed to prevent machines from being infected, identifying compromised ones, and disrupting command and control structures. In particular, I will focus on the shortcomings of previous approaches, as well as open problems in the area and the areas that have not been studied yet.
Volume of Threat: The AV update deployment bottleneckAnthony Arrott
The document discusses the increasing volume of malware and how it is overwhelming traditional antivirus update systems. It presents data showing exponential growth in new malware samples identified each year. This increase in malware is leading to more antivirus pattern files and updates that are straining current deployment methods. The document proposes moving to a cloud-based architecture for antivirus pattern and software updates as a powerful new layer of defense that can help address these challenges.
This document discusses emerging mobile data threats and security challenges. It provides examples of major cyber attacks from 2011 targeting governments and financial institutions. These attacks show an increase in advanced threats and the need to strengthen security perimeters as networks become more open. The document also highlights growing mobile malware risks and increasing malware dedicated to data theft. It introduces Kaspersky's Open Space Security product line for comprehensive protection across complex networks and endpoints.
This document discusses the democratization of information technology and the increasing accessibility of cloud computing resources over time. It notes several conferences and publications from 2008 to 2010 focusing on the growth of cloud computing and its impact on web businesses and performance. The document suggests that IT is becoming more accessible to everyone through clouds.
The Messaging Anti-Abuse Working Group (MAAWG) is:
1) A private sector consortium focused on anti-abuse issues like anti-spam.
2) It engages with standards, legislation, and law enforcement using a three-pronged approach of collaboration, technology, and public policy.
3) The group aims to preserve electronic messaging from online exploits and abuse by stopping abusive email and delivering legitimate email.
The document discusses the myth that Oracle databases are often hacked from external sources. It argues that in reality, the majority of attacks come from internal sources such as employees with access privileges, through passive means like exploiting known vulnerabilities, misconfigurations or errors rather than active hacking. Over 80% of attacks are done internally and over 90% exploit standard configuration issues, outdated software or publicized vulnerabilities rather than sophisticated hacking techniques. Insider threats from employees with access are among the most common and damaging attack methods.
This thesis analyzes the Rxbot malware. Rxbot is a win32 bot that belongs to the Agobot family. The analysis includes a static code analysis of Rxbot's source code to understand its modularity and configuration. A dynamic analysis examines Rxbot's process-level and network-level behaviors when built and executed. The analysis also describes tricks used by botmasters to evade detection. Finally, the thesis proposes future work analyzing botnets using honeypots.
This document discusses computer viruses and criminal internet businesses. It provides statistics on the number of known malicious software programs and web attacks over time. The history of some notorious computer viruses and their impacts are described. Statistics are presented on the top countries originating malicious servers and those most protected from infections. The document also examines trends in mobile phone threats doubling and malware targeting industrial control systems. It explores how botnets are used in criminal internet businesses for spam delivery, DDoS attacks, cyber racketeering and data theft. The document concludes with a forecast on the future split of cybercrime into business assaults and control systems attacks.
This document discusses threats from cybercrime and how they have evolved. It identifies teens and geeks who seek attention and cybercriminals who are profit-driven as the main threat actors. Their methods include social engineering, mass mailing, spyware/adware, and automated attacks. The consequences are lost productivity and identity theft. Around 1.5 million new malware samples are discovered each month, showing the magnitude of the problem. The security software market is growing and trends include virtualization, cloud computing, and free products gaining popularity. BitDefender is highlighted as the #1 anti-malware technology used to protect over 400 million people worldwide.
Internet Programming With Python PresentationAkramWaseem
This document provides an overview and agenda for the "Internet Programming with Python" tutorial being given at OSCON 2009. The tutorial will cover network programming with sockets in Python, including an introduction to client-server architecture and networking concepts. It will also cover internet client programming, CGI programming, and conclude with a question and answer session. The target audience is software engineers and system administrators with a basic Python knowledge seeking an introduction to internet programming topics in Python.
The world has changed, but marketing is still applying the principles I learned in business school. This needs to change and this presentation is an "open source" call to help achieve this change.
I have given it on April 23, 2009 in Helsinki at the F Word event. It is an unfinished piece of work in which we don't have all the answers either. So I invite you to join us at www.futurelab.net to help make it better.
The document discusses how cloud solutions can help protect email and web usage from evolving cyber threats. It summarizes the benefits of cloud computing but also the risks to email confidentiality and sensitive information from phishing attacks. Symantec.cloud is presented as a leader in security protections for email and web with a global intelligence network, service level agreements, and integration of email and web protection solutions. The document promotes upcoming webinars on Symantec endpoint protection and integrating data loss prevention with encryption.
Sean Parker argued that network services like Facebook, Twitter, eBay and Apple will dominate the future internet over information services like Google. Network services facilitate connections between users and gain value as more users join, due to network effects. Three key points: 1) Network companies will dominate due to increasing returns to scale from network effects. 2) Future economic value will be generated by facilitating user connections, not collecting data. 3) While Google will remain important, its relative influence will decline as network services that harness social connections rise in importance.
Mark Logic Digital Publishing Summit, KelloggDave Kellogg
Slides from my presentation at the Mark Logic Digital Publishing Summit at The Plaza Hotel in NYC on 12/10/09. Topics include trends re-shaping the media and software information infrastructure.
All business is personal. Social networks spawn social commerce--what may well become the most important outcome of 2008 as we see 2009 unfold. This and other trends discussed.
This document summarizes Paul Golding's presentation on mobile technology trends at the 2010 Eduserv Symposium. It discusses the evolution from Mobile 1.0 to Mobile 2.0, highlighting increasing processing power, usability and productivity of mobile devices. It also notes the proliferation of smartphones and growing mobile internet and app usage. Golding argues that mobile is becoming "everyware" and transforming how people organize their lives and interact in real-time through their devices. He envisions a future of augmented reality and an "Internet of Things" where most digital services are mobilized.
This presentation discusses the potential of mobile as a marketing medium in India, and the strategies marketers and agencies can adopt for optimum results. It also gives examples of great campaigns worldwide with relevant learnings. Th presentation ends with discussing the issues and solutions to the same.
1. A Survey of Spam
Mel Huang
Copyright 2009 Trend Micro Inc. 1
2. Outline
• Introduction
• As a Spammer
– Target
– Path
– Content
• Spam Ecosystem
• Anti-spam Solutions
• Do Anti-spam Solutions Work?
Copyright 2009 Trend Micro Inc. 2
3. Introduction
traditional spam
Copyright 2009 Trend Micro Inc. 3
4. Introduction
search social
messaging blog/wiki phone/SMS
engine networking
spam spam spam
spam spam
Copyright 2009 Trend Micro Inc. 4
5. 62T spam emails sent
Introduction 33B kWh energy usage
(could support 2.4M home in US)
17M tons of CO2
% of emails (0.2% of global emissions)
100
90 ?
80
70 Business cost US$130B
60 Spammers earned US$780M
50 Anti-spammers earned US$5B
40
30 Filtering saves 135B kWh
20
10
0
1971 … 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
1998 "Spam and the Ongoing Battle for the Inbox,” Communications of the ACM, 2007
2001 "Ending Spam's Free Ride," ACM Networker, 2003
2003 "Spam and the Social-Technical Gap," IEEE Computer, 2004
2004 "Bot Software Spreads, Causes New Worries," IEEE Distributed Systems Online, 2004
2005 "Scalable and Reliable Collaborative Spam Filters: Harnessing the Global Social Email Networks," CEAS 2005
2006 "The E-Mail Honeypot System - Concept, Implementation and Field Test Results," IEEE International Conference on the Digital Society, 2008
2007 "Spam and the Ongoing Battle for the Inbox," Communications of the ACM, 2007
2008 "The Economics of Botnets," Kapersky Lab, 2009
2010 "Correlating Spam Activity with IP Address Characteristics," IEEE Conference on Computer Communications, 2010
Related statistics http://ferris.com/reports/industry-statistics/
McAfee’s report http://www.mcafee.com/us/resources/reports/rp-carbonfootprint2009.pdf
Copyright 2009 Trend Micro Inc. 5
6. As a Spammer
social
economic
moral “Freakonomics,” 2005
Copyright 2009 Trend Micro Inc. 6
8. As a Spammer
path
target
content
Screenshot from Angry Birds by Rovio ®
Copyright 2009 Trend Micro Inc. 8
9. ?
As a Spammer
• Target
– web crawler
– dictionary trial and error
– steal member list “Who gets spammed?” Communications of the ACM, 2006
– buy from others
“Do Zebras get more Spam than Aardvarks?“ CEAS, 2009
“Understanding How Spammers Steal Your E-Mail Address,” CEAS, 2005
Copyright 2009 Trend Micro Inc. 9
10. As a Spammer
• Path
ESP/ISP
open proxy/relay
botnet
Copyright 2009 Trend Micro Inc. 10
11. As a Spammer “The E-Mail Honeypot System,” CEAS, 2008
“Spamming Chains,“ CEAS, 2009
“On the Spam Campaign Trail,” 2008
“Spamalytics,” Communications of the ACM, 2009
• Path
ESP/ISP
open proxy/relay
botnet
Copyright 2009 Trend Micro Inc. 11
12. As a Spammer “Anti-Honeypot Technology,” IEEE Security and Privacy, 2004
“Spamming Chains,“ CEAS, 2009
• Path
Copyright 2009 Trend Micro Inc. 12
13. As a Spammer
• Content
salad
jbvxc8b890
fjdaslioejw
jvcxzjvo bxjcv0g9d
jvsd9jowe rkstjkfs
fjew09as vcx89gjdf
bvxciobd bcvxklmkwr
random characters
“A Survey of Modern Spam Tools,” CEAS 2008
Copyright 2009 Trend Micro Inc. 13
14. Spam Ecosystem
EU$199 free to EU$599
“Anti-Honeypot Technology,” IEEE Security and Privacy, 2004 “A Survey of Modern Spam Tools,” CEAS 2008
response rate 0.0001% to survive
“Who Gets Spammed?” Communications of the ACM, 2006
“Spamalytics,” Communications of the ACM, 2009
honeypot hunter
spam tools providers
US$70 for 1000+ spammers US$1000-2000/month
“The Ecomonics of Botnets,” Kaspersky Lab, 2009
US$1000 for 10M+
“The Ecomonics of Botnets,” Kaspersky Lab, 2009
phishing hosting
rent for US$20/month/online bot
sell for US$0.5/bot
target harvesters average sending rate: 10 messages/min/bot
“The Ecomonics of Botnets,” Kaspersky Lab, 2009
botnet owners
Copyright 2009 Trend Micro Inc. 14
15. Unsolicited Bulk Email
Unsolicited Commercial Email Excuse me!
I’m a newsletter.
Anti-spam Solutions
Unsolicited Email
• Law
Junk Email
– spam definition?
• Pricing
– Microsoft Penny Black Project
Student Home Professional Enterprise
– Yahoo! CentMail US$99 US$999 US$9999 US$99999
“Spam and the Ongoing Battle for the Inbox,” Communications of the ACM, 2007
• Technology
“Spam and the Social-Technical Gap,” IEEE Computer, 2004
Copyright 2009 Trend Micro Inc. 15
16. Anti-spam Solutions
• Technology
– social networks
– content solutions “Leveraging Social Networks to Fight Spam,” IEEE Computer, 2005
“Scalable and Reliable Collaborative Spam Filters,” CEAS, 2005
• Bayesian filter “Saving Private E-mail,” IEEE Spectrum, 2003
• rules-based filter
– network solutions
• rule-based filter (black/gray/whitelist)
• authentication (DKIM, SenderID, …) “Filtering Spam E-mail on a Global Scale,” WWW Alt., 2004
“Stopping Spam by Extrusion Detection,” CEAS, 2004 “IPv6 and Spam,” MIT Spam Conference, 2009
“Stopping Outgoing Spam by Examining Incoming Server Logs,” CEAS, 2005
“Using Early Results from the spamHINTS Project to Estimate an ISP Abuse Teams Task,” CEAS, 2006 “Understanding Address Usage in the Visible Internet,” 2009
Copyright 2009 Trend Micro Inc. 16
17. Do Anti-spam Solutions work?
“Spamalytics,” Communications of the ACM, 2009 < 0.0001% > 0.0001% > 0.0001%
Copyright 2009 Trend Micro Inc. 17
18. Ah… Ah… Ah…
Copyright 2009 Trend Micro Inc. 18