02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DOCID: 4046925<br />

UNCLASSIFIEDHFOR OFFIOIAL l::JSE ONLY<br />

accounted for more than 40% of all spam messages generated in <strong>the</strong> fourth quarter<br />

of 2006, compared with less than 5% in <strong>the</strong> first quarter of 2005.,,170<br />

All it takes is a public willing to open spam email, especially in HTML format, or its<br />

(seemingly innocuous) attachments, and <strong>the</strong>re are millions of people still doing this.<br />

Spam sent using bets is notoriously difficult to trace because it uses o<strong>the</strong>r people's<br />

computers to traverse <strong>the</strong> Internet and, of course, always-on broadband connections<br />

only facilitate <strong>the</strong> movement of bots and spam.<br />

The year 2003 may be remembered in Internet history for reaching one very<br />

unfortunate milestone: <strong>the</strong>re were more spam emails than legitimate emails. "In<br />

2003, Brightmail [an anti-spam company] saw spam surpass legitimate emailgrowing<br />

to more than 56% of all Internet email, up from just 40% a year ago.,,171 The<br />

problem continues to worsen. In 2004, statistics painted a different picture.<br />

According to [e-mail security vendor FrontBridge's] figures, spam volume increased<br />

two percent, to 87 percent of e-mail, and has continued its growth each month since<br />

May of this year [2004]."172 December 2006 saw a new record: according to one<br />

tracking system, spam accounted for 94 percent of all email that month. 173<br />

Despite improvements in knowledge and education about computer security risks,<br />

too many people still know little or nothing about <strong>the</strong> vulnerabilities in <strong>the</strong> tools <strong>the</strong>y<br />

use every day, and this ignorance truly is bliss to <strong>the</strong> bad people wishing to exploit<br />

those weaknesses. Therefore, <strong>the</strong> first essential step in improving your Internet<br />

security and privacy is to learn more about basic vulnerabilities, exploits, and ways<br />

to protect yourself. Many of <strong>the</strong> recommendations in this book only need to be<br />

implemented one time for <strong>the</strong> life of a computer. Some, such as keeping basic<br />

software up to date, require more diligence. However, all are examples of "good<br />

computer hygiene" that will-or should-become second nature over time.<br />

There are new vulnerabilities disclosed literally every week, so this book cannot<br />

provide a comprehensive list of problems, flaws, and potential attacks. It can do<br />

three things:<br />

../ Provide general guidance on improving your Internet privacy and security.<br />

170 Paul McDougall, "Organized Malware Factories Threaten Internet Users, Study Says," Information<br />

Week, 30 January 2007,<br />

(31 January 2007).<br />

171 "Brightmail Reports on Spam Trends of 2003," Networks Unlimited, 27 February 2004,<br />

(link inactive as of November 2005).<br />

172 Sean Michael Kerner, ''The Deadly Duo: Spam and Viruses." ClickZ Stats, 16 November 2004,<br />

(14 November 2006).<br />

173 Gregg Keizer, "Spam Sets Record, Accounts For 94% Of E-mail," InformationWeek, 10 January<br />

2007 , 23 January 2007.<br />

UNCLASSIFIEDhTOR OFFIOIAL l:ISE ONLY 517

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!