Quarter of all spam comes as attachment, says Marshall

Around a quarter of all spams come as an attachment, according to a new study released by security supplier Marshal.

About a quarter of all spams come as an attachment, according to a study by security supplier Marshal.

While the sophistication of spamming remains low at the moment, if the spammers' social engineering skills improve, Britain could face a security crisis as harmful spam causes havoc, warned Ed Rowley, Marshal's head of technical sales.

"When spam senders improve their social engineering skills and they know enough about their targets to write an enticing or convincing e-mail top line, they could net many more victims," he warned. "This is what is known as spear phishing. They know enough about you to attach a convincing looking document - like an invoice relevant to your business - and you are suckered in."

Marshal reported today that spam containing attached PDF, Excel, Text and Zip files now represents almost 25% of all spam, which has surged up from 2% last week. Meanwhile the previously dominant Image Spam has reached a 12-month low of just 6% of all spam.

"Spam senders have to constantly evolve their forms. It will not be long before they evolve to make their intros look more genuine," he warned.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close