2. What is Security?
Security refers to freedom from, or resilience against, potential harm
(or other unwanted coercive change) from external forces.
Beneficiaries (technically referents) of security may be persons and
social groups, objects and institutions, ecosystems, and any other
entity or phenomenon vulnerable to unwanted change by its
environment.
- Wikipedia
3. Well, now you can relate to Cyber
security?
Basically security of all your digital devices and
information.
4. Who are Hackers and what is Hacking ?
In computing, a hacker is any skilled computer expert that uses their
technical knowledge to overcome a problem. While "hacker" can
refer to any skilled computer programmer, the term has become
associated in popular culture with a "security hacker", someone who,
with their technical knowledge, uses bugs or exploits to break into
computer systems.
- Wikipedia
5. Now, since things are clear let’s come to the
real question.
What is spam?
6. Spam is ...
Spam is sort of shorthand for cybercrime. You can’t get cybercrime
done these days hardly without spam. Look at some of the biggest
data breaches that have leaked out over the past year: Target, Home
Depot—well, we still haven’t really heard how Home Depot went
down—J.P. Morgan, and a lot of these big ones started with a
malicious email. Most people think about annoying ads when they
think about spam, but malware is primarily disseminated through
spam. So it’s still a huge vector for a ridiculous amount of cybercrime
that gets perpetrated each day.
- Brian Krebs
7. What is in there for spammers?
1. Money
2. Reputation
3. Sometimes Life
8. Meet the Spammers!
The best place to find out:
Spamhaus -
https://www.spamhaus.org/statistics/spammers/
9. What are botnets?
A botnet is a number of Internet-connected devices, each of which is
running one or more bots. Botnets can be used to perform
distributed denial-of-service attack (DDoS attack), steal data, send
spam, and allow the attacker access to the device and its connection.
The owner can control the botnet using command and control (C&C)
software.[2] The word "botnet" is a combination of the words "robot"
and "network". The term is usually used with a negative or malicious
connotation.
- One and Only - Wikipedia
10. How are botnets used?
1. Carrying out DDoS attack
2. Sending out spams
3. Getting more machines in the botnets
4. Creating more and more of Zombie Computers
11. The ANTIS
ANTIS are companies who tried to stand against the spammer and
tries to spam them.
This can not be completely stopped but can only be prevented.
“Blue Frogs” of “Blue Security” - A curious case of spammer winning
the battle.
12. Bulletproof Hosting
A botnet is a number of Internet-connected devices, each of which is
running one or more bots. Botnets can be used to perform
distributed denial-of-service attack (DDoS attack), steal data, send
spam, and allow the attacker access to the device and its connection.
The owner can control the botnet using command and control (C&C)
software. The word "botnet" is a combination of the words "robot"
and "network". The term is usually used with a negative or malicious
connotation.
- Wikipedia
13. How does spam affects economy?
Spammers buy penny stocks and play the game of pump and dump.
(Rings a bell?)
14. How they fool people to buy into them?
There comes our amazing friend - Black SEO
Black SEO is a way of injecting the malicious link in
top ranking sites to make the link look legitimate.