SlideShare a Scribd company logo
 Spam is the electronic version of junk mail.
 Spam can be used to deliver :-
Trojan horses, viruses, worms, spyware,
and targeted phishing attacks.
It was invented by George Hormel & Co.
in 1937. To name a food product named
SPiced hAM.
You do not know the sender.
Asked to send money to obtain a large cash
sum.
Asked for a password or banking account
information.
The sender repeatedly asks for personal or
secret information.
 Spammers regularly scan UseNet for
email addresses.
 Design the email.
 Broadcast it using fake accounts,
BotNet and proxy servers.
 The first person arrested for spamming
was Anthony Greco ,aged 18 on 2005 .
 He was accused of sending 1.5 million of
unsolicited ads.
 86% of email addresses post on internet
are used by spammers
 Bulgaria is the first country to legalized
spam.
 Fills your inbox with number of unwanted
emails.
 Degrades your internet speed to a great
extent.
 Steals your useful information.
 Alter your search results on any search
engines.
 Spam can crash mail servers and fill-up
hard drives.
Always use an updated trustworthy spam
filtering program.
Never share your e-mail address with
untrusted websites.
Avoid responding to suspected e-mails.
Append a plus ("+") sign and any combination
of words or numbers after your email address.
original
universityfan@gmail.com
After change
universityfan+lahiru@gmail.com
You could use universityfan+bank@gmail.com
when you sign up for online banking and
then set up a filter to automatically star, archive
or label emails addressed to universityfan+bank.
 More than 97% of emails sent over the
internet are spam emails
 349.6 billion in 2008 192% increase in
spam over the past year
Source:- Microsoft security intelligence report volume 6
The CNN news alert spam attack
 One of the largest spam attacks over the
last few months.
 Attackers sent millions of fake emails all
over the world (E-mails look like sent by
CNN).
Spamming is an illegal action to perform in
cyber space
spam attacks
spam attacks

More Related Content

What's hot

Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
master slave
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
NormShield
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
gagan deep
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social NetworkingHeather Grimes
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
Chip Thornsburg
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
Marian Merritt
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
WhoisXML API
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17
Eyal Doron
 

What's hot (11)

E spam
E spamE spam
E spam
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17
 

Viewers also liked

Portfolio
PortfolioPortfolio
Portfolio
Nikita Kumachovs
 
Haotai Insulation 4 Dry-Trsfm
Haotai Insulation 4 Dry-TrsfmHaotai Insulation 4 Dry-Trsfm
Haotai Insulation 4 Dry-TrsfmM.J. Chu
 
Service Delivery Checks-Arun Bhadra
Service Delivery Checks-Arun BhadraService Delivery Checks-Arun Bhadra
Service Delivery Checks-Arun BhadraArun Bhadra
 
Resumen psicometria entregar 2
Resumen psicometria entregar 2Resumen psicometria entregar 2
Resumen psicometria entregar 2
Cesario Lobos Fajardo
 
Chapter10spaceexploration 140624224923-phpapp02
Chapter10spaceexploration 140624224923-phpapp02Chapter10spaceexploration 140624224923-phpapp02
Chapter10spaceexploration 140624224923-phpapp02
_asyxaf
 
Spam attacks
Spam attacksSpam attacks
Spam attacks
Ranushka Pasindu
 
Soft Skills Module 13 Customer Service Standards
Soft Skills Module 13 Customer Service StandardsSoft Skills Module 13 Customer Service Standards
Soft Skills Module 13 Customer Service StandardsArun Bhadra
 

Viewers also liked (9)

Portfolio
PortfolioPortfolio
Portfolio
 
Haotai Insulation 4 Dry-Trsfm
Haotai Insulation 4 Dry-TrsfmHaotai Insulation 4 Dry-Trsfm
Haotai Insulation 4 Dry-Trsfm
 
Service Delivery Checks-Arun Bhadra
Service Delivery Checks-Arun BhadraService Delivery Checks-Arun Bhadra
Service Delivery Checks-Arun Bhadra
 
Resumen psicometria entregar 2
Resumen psicometria entregar 2Resumen psicometria entregar 2
Resumen psicometria entregar 2
 
pf
pfpf
pf
 
Chapter10spaceexploration 140624224923-phpapp02
Chapter10spaceexploration 140624224923-phpapp02Chapter10spaceexploration 140624224923-phpapp02
Chapter10spaceexploration 140624224923-phpapp02
 
Spam attacks
Spam attacksSpam attacks
Spam attacks
 
ISIP Report
ISIP ReportISIP Report
ISIP Report
 
Soft Skills Module 13 Customer Service Standards
Soft Skills Module 13 Customer Service StandardsSoft Skills Module 13 Customer Service Standards
Soft Skills Module 13 Customer Service Standards
 

Similar to spam attacks

Email marketing
Email marketing Email marketing
Email marketing
jafer87
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
Symantec Italia
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !Theawaster485
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
Symantec Italia
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
Souhail Hammou
 
Spam
SpamSpam
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
SaneBox
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
hichamelhirch
 
Phishing
PhishingPhishing
Oct 2011 Threats Trend Report
Oct 2011 Threats Trend ReportOct 2011 Threats Trend Report
Oct 2011 Threats Trend Report
Cyren, Inc
 

Similar to spam attacks (20)

What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Email marketing
Email marketing Email marketing
Email marketing
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Spam!
Spam!Spam!
Spam!
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam
SpamSpam
Spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
Final paper
Final paperFinal paper
Final paper
 
Phishing
PhishingPhishing
Phishing
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Phishing
PhishingPhishing
Phishing
 
Oct 2011 Threats Trend Report
Oct 2011 Threats Trend ReportOct 2011 Threats Trend Report
Oct 2011 Threats Trend Report
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 

Recently uploaded (20)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 

spam attacks

  • 1.
  • 2.
  • 3.  Spam is the electronic version of junk mail.  Spam can be used to deliver :- Trojan horses, viruses, worms, spyware, and targeted phishing attacks.
  • 4. It was invented by George Hormel & Co. in 1937. To name a food product named SPiced hAM.
  • 5. You do not know the sender. Asked to send money to obtain a large cash sum. Asked for a password or banking account information. The sender repeatedly asks for personal or secret information.
  • 6.  Spammers regularly scan UseNet for email addresses.  Design the email.  Broadcast it using fake accounts, BotNet and proxy servers.
  • 7.
  • 8.  The first person arrested for spamming was Anthony Greco ,aged 18 on 2005 .  He was accused of sending 1.5 million of unsolicited ads.  86% of email addresses post on internet are used by spammers  Bulgaria is the first country to legalized spam.
  • 9.  Fills your inbox with number of unwanted emails.  Degrades your internet speed to a great extent.  Steals your useful information.  Alter your search results on any search engines.  Spam can crash mail servers and fill-up hard drives.
  • 10. Always use an updated trustworthy spam filtering program. Never share your e-mail address with untrusted websites. Avoid responding to suspected e-mails.
  • 11. Append a plus ("+") sign and any combination of words or numbers after your email address. original universityfan@gmail.com After change universityfan+lahiru@gmail.com
  • 12. You could use universityfan+bank@gmail.com when you sign up for online banking and then set up a filter to automatically star, archive or label emails addressed to universityfan+bank.
  • 13.  More than 97% of emails sent over the internet are spam emails  349.6 billion in 2008 192% increase in spam over the past year Source:- Microsoft security intelligence report volume 6
  • 14.
  • 15.
  • 16.
  • 17. The CNN news alert spam attack  One of the largest spam attacks over the last few months.  Attackers sent millions of fake emails all over the world (E-mails look like sent by CNN).
  • 18. Spamming is an illegal action to perform in cyber space