Endpoint
7/16/2013
05:21 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

U.S. Still Tops Spam-Relaying 'Dirty Dozen' Countries

Three new companies enter Sophos' top 12

BOSTON, MA – July 16, 2013 – Sophos has published the latest 'Dirty Dozen' of spam relaying countries, covering the second quarter of 2013. As the US retains the top spot among spam-relaying countries, Belarus makes a significant jump into second place. And three new countries enter the top twelve--Ukraine, Kazakhstan and Argentina, while three other countries exit the Dirty Dozen--France, Peru and South Korea.

Dirty Dozen Rating by Population

With more than a billion people and an increasing demand for internet access in both countries, it's no surprise to see China and India in the Dirty Dozen; and with more than 300 million people and the lion's share of the world's internet connectivity, it's also no shock that the US leads outright. So what happens when spam scores are scaled up or down in proportion to each country's population?

Half of the volume-based countries are gone, and others that would usually fly under the radar when measured on spamming volume alone, like Luxembourg and Singapore, suddenly burst onto the scene. This doesn't mean that Singapore is replete with spam-related cybercriminality.

Although the Dirty Dozen denotes the extent to which a country's computers are used for delivering spam, it doesn't identify where the spammers themselves are located. That's because most spam is sent indirectly these days, especially if it is overtly malevolent, such as:

· Phishing emails: These try to lure you into entering passwords into mock-ups of a real site such as your bank or your webmail account.

· Malware links: These urge you to click links that put you directly in harm's way by taking your browser to hacked websites.

· Malware deliveries: These use false pretences, such as fake invoices, to trick you into opening infected attachments.

· Identity theft: These invite you to reply with personally identifiable information, often by claiming to offer work from home opportunities.

· Investment scams: These talk up investment plans that are at best unregulated and at worst completely fraudulent.

· Advance fee fraud: These promise wealth or romance, but there are all sorts of fees, bribes and payments to hand over first.

"Remember that the Dirty Dozen doesn't tell us from where the spam originates," said Paul Ducklin, Sophos security evangelist. "It tells us how spam gets relayed from the crooks to their potential victims. Even if you're the most law-abiding citizen of the most law-abiding country in the world, you might be helping to project your own country into the Dirty Dozen if you don't take security seriously on your own computer. It may sound corny, but security really does begin at home."

There are a few simple precautions can help enormously, according to Ducklin. These include "timely security patching, an up-to-date anti-virus and a healthy skepticism about unwanted attachments and 'too good to be true' offers. By taking these steps, you'll not only protect yourself, but also help to protect everyone else at the same time."

Additional information about the latest dirty dozen report can be found on Sophos' Naked Security site at: http://nakedsecurity.sophos.com.

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio