Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

08:07 AM

SpamRats Running Rampant on the Internet

Wizard IT recently launched its newest project, SpamRats.com

SURREY, British Columbia -- Wizard IT Services: As security threats continue to plague email and Internet users, Wizard IT recently launched its newest project, SpamRats.com. The much anticipated SpamRats project is now up and running and is being introduced as a 'Solution Set' of fully-automated and free Real Time BlackLists (RBLs), designed to target various Trojans, Bots, infected PCs and other IP address which are being used to send out spam.

Building on its reputation as a leader in anti-spam technologies, Wizard IT is now offering the public these anti-spam tools for free through the SpamRats website(www.SpamRats.com) and through MagicMail, a product offering from its sister company LinuxMagic. The tools provided on the SpamRats website are designed to be used use by anyone and on almost any email server.

Michael Peddemors, President/CEO of Wizard IT, strongly believes that stopping the sender is better than trying to filter what they send. He says that the use of IP Reputation is one of the most effective

ways for Internet service providers to reduce overhead, bandwidth, and the amount of Unwanted Bulk Email (UBE) received.

"It is a 'Zero Day' protection approach that is needed to stop the millions of Trojans and Bots that send spam or attack servers. People need to be protected against new and unknown threats before the vulnerability is discovered and exploited,” said Mr. Peddemors. He added, “we have seen the progression of how Spammers have tried to get around filters. At first there were plain text spam messages, then it was spam in attachments, after it was spam hidden in images, then it was in PDF's, and now we see Spam in WAV audio and voice messages. Spammers will always try to get around the filters because there is so much money to be made, but if you can stop the connection at the point when you determine it likely to be an infected PC or a spam engine, then you get 'Zero Day' protection. If you know what is going to be sent to you is infected or abusive, filtering technology 'should not' be your first line of defence.”

Wizard IT Services

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.