Risk
2/6/2008
06:37 PM
Tom LaSusa
Tom LaSusa
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Europe: For All Your Spam Needs

Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec sa

Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec says it's responsible for most of the spam sent worldwide. I guess two outta three ain't bad.As detailed in its monthly "State of Spam" report, Symantec states that 44% of the world's spam now originates from Europe, as opposed to the 35% that comes from North America. Not only that, but this is the third month in a row that Europe has topped the U.S. in this category.

By comparison, when Symantec first began tracking the stats less than six months ago, Europe was responsible for 30% while North America claimed ownership of more than 46%.

In fairness, Symantec makes a few disclaimers about its findings. The use of Trojans and other redirect technology allow spammers to make it look like their messages are coming from geographical locations. So it's impossible to say with total certainty where the spam's point of origin is, exactly.

Now before everyone here in the States breathes a sigh of relief that the heat is on someone else for a change, don't wipe your brows just yet -- we're still responsible for a hefty chunk of the e-junk. At least the spammers in our own 'backyard' are. And we're no closer to curtailing the proliferation.

Oh, and in case you're wondering where that remaining 21% of spam comes from -- let's just say raising polar bears and mysterious black clouds aren't the only things those Dharma folks are up to on that island of theirs. 'Namaste,' my Aunt Petunia!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4013
Published: 2014-07-14
SQL injection vulnerability in the Policy Manager in Aruba Networks ClearPass 5.x, 6.0.x, 6.1.x through 6.1.4.61696, 6.2.x through 6.2.6.62196, and 6.3.x before 6.3.4 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-4944
Published: 2014-07-14
Multiple SQL injection vulnerabilities in inc/bsk-pdf-dashboard.php in the BSK PDF Manager plugin 1.3.2 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) categoryid or (2) pdfid parameter to wp-admin/admin.php.

CVE-2014-4945
Published: 2014-07-14
Multiple cross-site scripting (XSS) vulnerabilities in Horde Internet Mail Program (IMP) before 6.1.8, as used in Horde Groupware Webmail Edition before 5.1.5, allow remote attackers to inject arbitrary web script or HTML via an unspecified flag in the basic (1) mailbox or (2) message view.

CVE-2014-4946
Published: 2014-07-14
Multiple cross-site scripting (XSS) vulnerabilities in Horde Internet Mail Program (IMP) before 6.1.8, as used in Horde Groupware Webmail Edition before 5.1.5, allow remote attackers to inject arbitrary web script or HTML via (1) unspecified flags or (2) a mailbox name in the dynamic mailbox view.

CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.