Spam in 2013: statistics, trends and interesting facts

Most recent:
  • Available Westworld Awakening: an adventure of virtual reality where we are a host
  • ‘Perfect World’, the well-known free MMORPG based on chinese mythology, comes to Android
  • Trailer of 'The Report': Adam Driver airs out the dirty laundry of the CIA in a new movie from Amazon Prime
    SAYS cancels the competitive mode of 5v5 Battlefield V


    target=”_blank”> have a report updated conducted by Kaspersky Lab where it says the current state of spam in the world. It speaks of the methods used, statistics and malicious files, data that can help us better understand What is spam .

    We leave you with the points treated there:

    preferred methods of deception to spam

    malicious Emails corporate users:
    The preferred target for spammers is and will always be the corporate audience. Of course, the tactics that should transcend mere false messages of type Rewards “You’ve been selected to take an iPad!” , the key is to make employees and employers believe that the email just arrived is just one of the thousands who are receiving daily, for example, with fake notification of emails that have not been correctly sent or messages that highlight the arrival of a new communication (document scanning, fax, text file) .

    spam corporation

    Sure, spammers do not skimp on details and are responsible for providing each email a brand visual touch that makes him look like actual notice, much more making references to email accounts holders and reputation (as HP notifications for new documents received and ready for printing), only documents bearing attachments are not more than Trojans and other malicious software huge amount.

    Emails supposedly from trusted sites:
    It is important to know that email is not a HTML code interpreter, language with which you can design a complete website and also decorate emails (headers, logos, colors, etc..) to give elegance and confidence each communication. The problem is that they are so easy to design it is also replicated, so not because an email has the appearance of coming from a virtual shop with a catalog of products or notifications deals shopping carts, means that reliable , everything can be copied! Obviously the goal is to send links that redirect to other sites to keep personal data and making false transactions.

     Post

    eCards or malicious virtual cards:
    Possibly more common in the second half of the year by the number of celebrations taking place, but they are still a security hole that can only be dropped by ingeniudad (if it is redeemable gift cards, it is best to contact first with the friend or relative who sent it). They usually come with links to foreign sites or just with attachments that will more than likely not malware ready to occupy a place on your computer. Although this type of spam is not as common, is still present in the statistics.

    invisible text random text:
    Gmail, Yahoo!, Outlook and other services popular email antiSPAM often have powerful filters that barely leave the occasional brew offers and other message. However, a tactic used to try to bypass these filters is to random textual content after images and other content of the basic message (an image with the offer and a link to it), which makes it look a direct and personalized but not something sent in bulk. Most discrete usually put this text in a hidden way, that is, to coincide with the background color of the message.

    spam statistics in 2013

    Percent global spam:

    percentage

    Compared to the first quarter of the year, in the study of Kaspersky Lab say they have been a slight increase of 4.2% in terms of total spam traffic, stressing that staggering 70.7% of all content received via email is junk content. The graph represents the percentage changes month to month where it shows that despite the changes, except for January which shows a 58.3% of total spam, there is a tendency to stay around 70%.

    The continents and the countries that send spam:
    Anyone can easily interpret the colorful pie chart representing the spam by countries which are duly organized high to low on the right side. The five countries that produce spam are China (23.1%), USA (16.8%), South Korea (12.6%), Taiwan (5.6%) and Vietnam (4.1%), something interesting is that they are three republics related the inactive USSR: Ukraine, Kazakhstan and Belarus.

    countries

    Maybe not mentioned on SecureList analysis but there are important implicit variables are strongly correlated with the results: The location, the level of Internet penetration in each country, the type of government, their wealth, the number of people, type of government, exports and relations with the public of USA, a leading Internet markets. Something similar happens with continents showing Asia (56.3%, more than half of global spam), USA (18.2%) and Eastern Europe (13.7%) in the first place:

    places

    standard size (Kb) of the spam messages:

     file

    According to the records of Kaspersky Lab, a spam message is the basic characteristic of almost 80% of all spam flowing into the network via email, of 1 kb of size, taking it to another level, an average song in mp3 format which is usually around 4Mb amount to 4,000 of these emails. The messages “heavy” whose content has a size between 50 and 100 Kb, do not exceed 3% of all spam circulating, the problem is that they are the most dangerous because it makes heavy are malicious files disguised as attachments .

    that never fail: malicious attachments and phishing

    As regards statistics malicious attachments, is highlighting that 40%, the Most Trojans are designed to steal personal information from which includes financial data and log data in online games by their nature require constant interaction with certain payment systems. There is also a chart that highlights the countries preferred by cybercriminals to perform this type of attack: the most “developed”.

     phishing

    Finally, you can not leave without mentioning the phishing or phishing email (eg emails that spoof bank communications, requested financial data or click on certain links ask for questions with certain departments institution) who holds the 0.0016% and 0.0024% of spam, again, the study of Kasperky Labs and tools based on their protection. Percentages seem low and reportedly is the tendency to attack via spam but requiring less user intervention, a staple in the phishing and can be solved with Trojans and other malicious software.

    For the phishing also has a graph of the main objectives of the attacks, ranking which shows social networks in the lead for the amount personal data they handle followed by banks and other financial institutions:

    phishing

    Anyway, it phishing , are malicious files disguised as corporate documents, are eCards or any of the many methods used by spammers to carry out their attacks, the key to the protection, rather than antivirus software and the like, provided is to use common sense: if I have received an attachment from a stranger, will it be worth to open it?, why is a text document format. exe, how is that I won the lottery without having purchased?, why my bank asking me my personal and my keys hereby?, etc..


    Text written in wwwhatsnew. com

    Follow the news by twitter.com / wwwhatsnew , Facebook.com / wwwhatsnew or Google Plus .



    Wwwhat’s new?

    Spam in 2013: statistics, trends and interesting facts
    Source: www.techradar.com  
    August 14, 2013

    Next Random post