Endpoint
7/16/2013
05:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

U.S. Still Tops Spam-Relaying 'Dirty Dozen' Countries

Three new companies enter Sophos' top 12

BOSTON, MA – July 16, 2013 – Sophos has published the latest 'Dirty Dozen' of spam relaying countries, covering the second quarter of 2013. As the US retains the top spot among spam-relaying countries, Belarus makes a significant jump into second place. And three new countries enter the top twelve--Ukraine, Kazakhstan and Argentina, while three other countries exit the Dirty Dozen--France, Peru and South Korea.

Dirty Dozen Rating by Population

With more than a billion people and an increasing demand for internet access in both countries, it's no surprise to see China and India in the Dirty Dozen; and with more than 300 million people and the lion's share of the world's internet connectivity, it's also no shock that the US leads outright. So what happens when spam scores are scaled up or down in proportion to each country's population?

Half of the volume-based countries are gone, and others that would usually fly under the radar when measured on spamming volume alone, like Luxembourg and Singapore, suddenly burst onto the scene. This doesn't mean that Singapore is replete with spam-related cybercriminality.

Although the Dirty Dozen denotes the extent to which a country's computers are used for delivering spam, it doesn't identify where the spammers themselves are located. That's because most spam is sent indirectly these days, especially if it is overtly malevolent, such as:

· Phishing emails: These try to lure you into entering passwords into mock-ups of a real site such as your bank or your webmail account.

· Malware links: These urge you to click links that put you directly in harm's way by taking your browser to hacked websites.

· Malware deliveries: These use false pretences, such as fake invoices, to trick you into opening infected attachments.

· Identity theft: These invite you to reply with personally identifiable information, often by claiming to offer work from home opportunities.

· Investment scams: These talk up investment plans that are at best unregulated and at worst completely fraudulent.

· Advance fee fraud: These promise wealth or romance, but there are all sorts of fees, bribes and payments to hand over first.

"Remember that the Dirty Dozen doesn't tell us from where the spam originates," said Paul Ducklin, Sophos security evangelist. "It tells us how spam gets relayed from the crooks to their potential victims. Even if you're the most law-abiding citizen of the most law-abiding country in the world, you might be helping to project your own country into the Dirty Dozen if you don't take security seriously on your own computer. It may sound corny, but security really does begin at home."

There are a few simple precautions can help enormously, according to Ducklin. These include "timely security patching, an up-to-date anti-virus and a healthy skepticism about unwanted attachments and 'too good to be true' offers. By taking these steps, you'll not only protect yourself, but also help to protect everyone else at the same time."

Additional information about the latest dirty dozen report can be found on Sophos' Naked Security site at: http://nakedsecurity.sophos.com.

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice one
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1235
Published: 2015-04-19
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.

CVE-2015-1236
Published: 2015-04-19
The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a cr...

CVE-2015-1237
Published: 2015-04-19
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages ...

CVE-2015-1238
Published: 2015-04-19
Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.

CVE-2015-1240
Published: 2015-04-19
gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.