Printer Friendly

Security news and products; on the menu today is Phish and Spam.

The terms Phishing and Spam are no longer new phrases in the cyber scene, both gaining a lot of publicity in the Internet scene over the last two years. A recent Gartner survey found that phishers are even becoming more specific in who they target, opting for the higher earners or those more likely to make a transaction on the internet. However the criminal underworld, where these two forces have been increasingly working closely together, is a lot less publicized. Almost unknown to us until this year, phishers have actually been paying spammers for the one thing they know best ... our email addresses.

The buying and selling trade of email addresses is now working like this: spammers break into websites' databases for email addresses using tools such as botnets. Once a database is infiltrated, these botnets gather all pertinent information such as names, address and hobbies. These pieces of information, along with the email address, are then sold to the phishers. Spammed phishing attacks have become notorious in 2006 as phishers continued their release of phishing email messages, primarily (and most worryingly) using financial brands.

The security industry is continuously updating itself to fight off the phishing schemes and in Brazil and the UK, three men were arrested and jailed for their phishing schemes this year. But just like the virus and spyware neighbourhood, phishing and spam might forever be here to stay. As long as spammers and phishers continue to work together and find innovative ways to pass through the defenses of online financial institutions, as long as these cyber criminals are able to find ways to hide their identities and locations, and as long as Internet users are not updated with each and every new spam and phishing technique, phishing and spam are here to stay.

www.trendmicro.co.uk
COPYRIGHT 2006 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2006, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:SOFTWARE WORLD DIGEST
Publication:Software World
Date:Nov 1, 2006
Words:302
Previous Article:Security news and products; IBM Internet Security Systems expands desktop protection.
Next Article:Security news and products; over half of Chinese malware aims to steal passwords.
Topics:


Related Articles
Ten Commandments for safe and sane connectivity.
Monster in your computer: infectious spam weaks inbox havoc. (Spotlight).
QUALCOMM releases Eudora 6.0.
Dynamicsoft chooses Proofpoint protection server for centrally-managed anti-spam security.
Software World Editorial Index 2003.
Choosing the right spam solution.
PHISHHEADS IN MOURNING.
Do-it-yourself phishing kits found on the internet.
Digital crime wave: the growing problem.
Security and products; top 10 threats for February.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters