US, Russia and China main sources of malicious content

The world's superpowers, the US, Russia and China, are the top three sources of malicious content, with Britain a lowly 14th, according to two reports by security experts Kaspersky Lab.

The world's superpowers, the US, Russia and China, are the top three sources of malicious content, with Britain a lowly 14th, according to two reports by security experts Kaspersky Lab.

The security supplier studied trends in graphical spam and the development of new security by-pass techniques.

The studies looked at originating IP addresses of malware. Another trend identified is that graphical spam and social engineering techniques are seen as the most effective methods of bypassing security and continue to be developed by hackers.

Exploiting internet browsers is also a new growth area on the IT crime scene, according to the survey.

The reports, "The evolution of spam" and "The malware evolution", were researched between January and June 2007. Anna Vlasova, Kaspersky's head of antispam and author of the report, says the criminals are not giving up. "Clearly graphical spam has turned out to be less effective as spam filters evolve. But the spammers have no intention of abandoning this tactic."

"The bad news is, spammers are using social engineering to gain people's confidence. But the good news is, foreigners dominate the market, and they do not know how to social engineer the Brits," said Vlasova.




Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close