www.fgks.org   »   [go: up one dir, main page]

 WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. 

Spam

Blogs

Fine Grained Mail Filtering With IPv6

One of the hottest topics in the email biz these days (insofar as any topic is hot) is how we will deal with mail on IPv6 networks. On existing IPv4 networks, one of the most effective anti-spam techniques is DNSBLs, blackists (or blocklists) that list IP addresses that send only or mostly spam, or whose owners have stated that they shouldn't be sending mail at all. DNSBLs are among the cheapest of anti-spam techniques since they can be applied to incoming mail connections without having to receive or filter spam. more»

The Naive Arrogance of FUSSPs

Everyone who's been in the e-mail biz long enough knows the term FUSSP, Final Ultimate Solution to the Spam Problem, as described in a checklist from Vern Schryver and a form response that's been floating around the net for a decade. FUSSPs fall into two general categories, bad ideas that won't go away, and reasonable ideas that are oversold. more»

Canada's Anti-Spam Law Coming Into Force July 01, 2014

Canada's Anti-Spam Law, CASL, is now a done deal. Last Thursday, Treasury Board of Canada President (and champion of CASL) Tony Clement approved Industry Canada regulations in their final form. Today, Minister of Industry the Honourable James Moore announced CASL will come into force in July 1, 2014. more»

2014 M3AAWG Mary Litynski Award Nominations Now Being Accepted

In 2010 the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) and the Internet industry as a whole lost a great friend and supporter, Mary Litynski. Her dedication, excellence, perseverance and tireless work behind the scenes of M3AAWG helped make the organization the success that it is today. Through this award, M3AAWG seeks to bring attention to the remarkable work that is done far from the public eye over a significant period of time... more»

Phishing: A Look Into the E-Crime Landscape

At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more»

Spam Arrest's Sender Agreement Fails Because Email Marketer's Employees Lacked Authority

People hate receiving spam, but most people stopped obsessing about spam a decade ago or more. In the interim, anti-spam filters have improved dramatically. Still, some anti-spammers hate spam so passionately -- or, perhaps, hope to put a little coin in their pockets -- that we still see a steady stream of lawsuits against email marketers. For the most part, those lawsuits don't win; in the past half-decade, repeat anti-spam plaintiffs have rarely won in court. more»

How Not to Stop Spammers

Spam Arrest is a company that sells an anti-spam service. They attempted to sue some spammers and, as has been widely reported, lost badly. This case emphasizes three points that litigious antispammers seem not to grasp: Under CAN SPAM, a lot of spam is legal; Judges hate plaintiffs who try to be too clever, and hate sloppy preparation even more; Never, ever, file a spam suit in Seattle. more»

Polish CERT Polska and NASK Pull the Plug On .pl TLD On Malicious Registrar, Domain Silver

Today we publish an overview of domains registered through Domain Silver, Inc, a registrar operating in the .pl domain. This Registrar started operating in May 2012. Since that time, the CERT Polska team started to observe a large increase in the amount of malicious domains registered in .pl and to receive many complaints concerning domains registered through Domain Silver. more»

The Death of IP Based Reputation

Back in the dark ages of email delivery the only thing that really mattered to get your email into the inbox was having a good IP reputation. If your IP sent good mail most of the time, then that mail got into the inbox and all was well with the world. All that mattered was that good IP reputation. Even better for the people who wanted to game the system and get their spam into the inbox, there were many ways to get around IP reputation. more»

CAN SPAM Issues in Zoobuh V. Better Broadcasting

Last week a Utah court issued a default judgement under CAN SPAM in Zoobuh vs. Better Broadcasting et al. I think the court's opinion is pretty good, even though some observers such as very perceptive Venkat Balasubramani have reservations. The main issues were whether Zoobuh had standing to sue, whether the defendants domain names were obtained fraudulently, and whether the opt-out notice in the spam was adequate. more»

How to Stop the Spread of Malware? A Call for Action

On Webwereld an article was published following a new Kaspersky malware report Q1-2013. Nothing new was mentioned here. The Netherlands remains the number 3 as far as sending malware from Dutch servers is concerned. At the same time Kaspersky writes that The Netherlands is one of the most safe countries as far as infections go. So what is going on here? more»

Different Focus on Spam Needed

It is surprisingly difficult to get accurate figures for the amount of spam that is sent globally, yet everyone agrees that the global volume of spam has come down a lot since its peak in late 2008. At the same time, despite some recent small decreases, the catch rates of spam filters remain generally high... A world in which email can be used without spam filters is a distant utopia. Yet, the decline of spam volumes and the continuing success (recent glitches aside) of filters have two important consequences. more»

Breaking Down Silos Doesn't Come Easy

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so? more»

Correlation Between Country Governance Regimes & Reputation of Their Internet Address Allocations

We recently analyzed the reputation of a country's Internet (IPv4) addresses by examining the number of blacklisted IPv4 addresses that geolocate to a given country. We compared this indicator with two qualitative measures of each country's governance. We hypothesized that countries with more transparent, democratic governmental institutions would harbor a smaller fraction of misbehaving (blacklisted) hosts. The available data confirms this hypothesis. A similar correlation exists between perceived corruption and fraction of blacklisted IP addresses. more»

The Spamhaus Distributed Denial of Service - How Big a Deal Was It?

If you haven't been reading the news of late, venerable anti-spam service Spamhaus has been the target of a sustained, record-setting Distributed Denial-of-Service (DDoS) attack over the past couple of weeks... Of course, bad guys are always mad at Spamhaus, and so they had a pretty robust set-up to begin with, but whoever was behind this attack was able to muster some huge resources, heretofore never seen in intensity, and it had some impact, on the Spamhaus website, and to a limited degree, on the behind-the-scenes services that Spamhaus uses to distribute their data to their customers. more»

News Briefs

Spam-Friendly Registrar 'Dynamic Dolphin' Shuttered by ICANN

Arrest Made in Connection to Spamhaus DDoS Case

Massive Spam and Malware Campaign Following Boston Tragedy

Largest DDoS Attack To Date Aimed at Spamhaus Effects Global Internet Traffic

Google Removes All Sites Under .CO.CC Over Security Concerns

Happy Canada Day from the CRTC

Researchers Use Social Graphs to Detect Spammers, Attackers

CAUCE Director Neil Schwartzman Wins Prestigious MAAWG Award

Research Detects Spammers Using Fake URL-Shortening Services

Garth Bruen Discussing Whois, DNSSEC and Domain Security

More Targeted Phishing, Spam and Mobile Attacks; IBM Reports 150K Security Events Per Second

New Anti-phishing Initiative Introduced by Yahoo!

Microsoft, Federal Agencies Take Down Rustock Botnet

Google to Let Users Block Sites Based on Domain Names

Conflict Over Efforts to Develop a Best-Practices Document for Blacklist Operators

Cybercriminals Shifting Focus From Windows PCs to Other Systems and Mobile

Google, Microsoft, Others Join Obama to Fight Phony Pharmacies

The Changing Landscape of Online Fraud

Average Daily Malware at All Time High, Spam Lowest Since 2008

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection