Announcements:

I am currently writing at Computelogy.com actively and that's why i sort of abandoned my own tech blog. Since i am too busy to be taking care of both sides, i guess this blog will go into hibernation for a very very long time. Regrettable, but then it's hard to come up with new posts & stuffs.

So once again, i am now writing actively at Computelogy. Feel free to visit there and enjoy our latest articles and posts!

November 15, 2008

Online Threats: Spam & E-Mail Spoofing


On this topic, i'll be combining two online threats together, which is both spam & e-mail spoofing. While E-mail spoofing is a standalone topic, spam is closely related to both phishing & the topics on Botnets (part of Network Attacks), which i will discuss after this topic. Even though the two threats differents significantly, i chose to discuss both together in this post mainly because they are both a nuisance to an element of your computering life - your host-based & Web-based e-mail inbox.

1. E-mail Spam

Commonly refered to as "junk mail", spams are designated to annoy users who have an e-mail service. Even though spams are usually harmless because most only facilitates the advertisement of certain stuffs (which most people had little interests in them), it can be considered as an annoyance. People getting hit by lots of spams normally had their e-mail inbox filled up daily by spam e-mails and the next thing they know, they are spending lots of time in detecting which e-mail is spam and which is not before deleting them all. If they ignore the current load of spam e-mails, they will have even more to read and to delete during the next day. Some spams are on advertising certain stuffs, but there are spams that are of pointless content,usually with threatening/frightening messages which serves to waste user's time on reading its contents.

Spam e-mails are generated by its creators, and by collecting our e-mail addresses vis different methods, they begin sending them out to our inbox at random. Spams are growing at a steady rate over the years and only recently began decreasing due to refined spam filtering by Webmail services. Most spam e-mails point to a certain website, which can be financial websites, products websites, leisure websites & even adult websites. A small portion af spam directs user to a scam website, where real threats looms.

Those with immediate contact with me via hotmail address...remember why i always mention that no spams are to be delivered to my hotmail account? That is because sometimes Webmail users are not aware of which e-mails are spams and which are not. Spamming can only be forgiven when users are not aware that their computer is infected with a botnet, which essentially encourage a system be infected with more malwares (i will discuss this in our next topic on Denial of Services attacks).

To curb spams (besides offering stronger spam filtering), most Webmail service providers such as Windows Live Hotmail also provide users a "blacklisting" option in their e-mail settings , where users can include a spam e-mail in their blacklist so the account will remember the e-mail as spams next time a similar e-mail come knocking at their e-mail inbox.

Below is an illustration of how spam on Viagra operates. Spams on Rolex watches & Viagra are the most common spam contents in the U.S


2. E-mail Spoofing

E-mail spoofing is used to describe fraudulent e-mail activity in which the sender address and other parts of the e-mail header are changed to appear as though the e-mail originated from a different source. Unlike spamming, which aims to get users to pay attention to a certain advertisement and attracting them to purchase/obtain the product, E-mail spoofing is essentially "spamming of a different kind", where the intention of the spoofer is to either damage the reputation of an existing organization via destructive contents of the e-mail or to get users to reply to their account (whether with fraudulent intention or not).

It is also related to website spoofing, where it imitates a well-known website which is actually run by a third party as an intention for frauds or for general protests. To track the spoofers are no easy task; as many spammers now use special software to create random sender addresses, even if the user finds the origin of the e-mail it is unlikely that the e-mail address will be active. Even hackers use e-mail spoofing technique as a mean of concealing their identity while sending e-mail attachment containing worms to destroy as user's PC. Nowadays, it is possible that all new variants of internet worms contains elements of this technique.

0 opinion:

Review Digital Plexus

I do not know how well this blog is doing unless there are feedbacks. Please do leave a review or two with us on how you think about Digital Plexus, its authors or the qualities of the posts. Good and bad comments are all welcomed, but please avoid posting rude/obscene comments that are not helpful to any of us working on this blog:

Disclaimer:

This blog is dedicated for the benefits of those who seeks experiences, knowledge or information in the computer, IT news, technology and software & hardware area. Digital Plexus cannot control how readers use the information, including any fraudulent conducts, illegal activities or deeds as regard by the law. Therefore, Digital Plexus & its authors shall not be liable to any damages caused by readers who misuse the information provided.

Digital Plexus utilizes information from many sources, including personal experiences of authors. Digital Plexus will never claim credits or ownership rights regarding the information it used in the blog, except for the raw articles posted on the blog - those are original materials written by the authors of Digital Plexus itself after the compilation of various information and/or experiences.

Followers

  © Blogger templates 'Neuronic' by Ourblogtemplates.com 2008

Back to TOP