Feeds

Porn spam on the rise

Tricks and countermeasures

  • alert
  • submit to reddit

Top three mobile application threats

Updated UK corporates are bombarded by porn and pedo bulk-emails - and ineffective anti-spam software and outdated email usage policies mean that many are coping badly

That's the warning from messaging firm Nexor which reckons pornographic emails are on the rise and that many are passing through ineffective defences to reach workers' desktops. It reckons pornographic email is growing at a minimum of 20 per cent per annum, and possibly more, because of under-reporting of the problem.

Not everyone agrees with this assessment, however.

Specialist spam filtering firm Brightmail reckons that porn spam is on the rise, but only because spam itself is still increasing. Proportionally speaking porn is responsible for approximately 8 per cent of spam - a figure that's stayed constant for the past two months, it reckons

So should companies care about their employees receiving Spam? The answer would appear to be an emphatic yes.

As well as wasting time dealing with offensive messages, employees who respond to such emails and download illegal content from their workplace could leave both themselves and their employers open to investigation, Nexor warns.

Standard methods for spam control rely on key word searching and referral to real time black hole lists which compile lists of known spammers. Spammers are aware of these methods and are developing ways to beat them, according to Nexor, which says porn spam is notoriously hard to intercept. The company sells technology, called Nexor Interceptor, which identifies the content of emails based upon the natural language concepts contained within them, and not keywords.

Its more sophisticated pattern matching and neural network technology does a better job in blocking spam - particularly unsolicited messages containing pornographic content, Nexor reckons.

Rival firm Brightmail (which uses grouping algorithms, pattern matching and decoy email boxes is its server-side filtering products) maintain that its technology gives the best results.

Whatever the truth of these rival marketing claims a recent article by Associated Press provides evidence that spam control methods in general and organisations such as Spamhaus.org are making life increasingly difficult for bulk emailers.

AP interviewed a number of notorious bulk emailers for the article, including Bernard Balan, 51, of Ontario, Canada, who told the news agency he has gone through "unbelievable hardships" to keep the spam flowing from his one-stop-financial.com operation.

"My operating costs have gone up 1,000 percent this year, just so I can figure out how to get around all these filters," he told the news agency.

Steve Linford, director of the London-based Spamhaus Project, which tracks the Internet's worst spammers and provides blacklists of their IP addresses, reckons specialist software is only part of the solution.

Ninety per cent of spam emails come from 100-150 known spammers, he says, so organisations configuring their mail server to query the Spamhaus Block List, a real time DNS-based database of IP addresses of verified spammers, can block a huge amount of email from junk senders. Referring to Spamhaus' list allows email to be blocked without having to look at its content - saving processor time, he said.

Nexor and McAfee anti-spam products can block email from open proxies, unlike Spamhaus' free services which does not, so Linford reckons firms would achieve the best results from a combination of the two technologies.

Stream of depravity

Technology differences aside, Linford supports Naxor's view that the flood of pornographic emails is on the rise. Many spam messages now often come with photographs attached or containing Javascript which, if opened, causes browsers to open onto pornographic Web sites, he told us.

Many spammers come from a background in the porn industry, so although they might deny it, Spamhaus reckons more than 50 per cent of the worst spammers are sending out pornographic messages.

Pornographic emails bordering on paedophilia are becoming more commonplace, Linford told us, though these most often come from a different group of individuals operating pedo Web sites.

The disturbing popularity of such Web sites was highlighted last weekend when it emerged that the FBI had trapped more than 7,000 British paedophiles in a sting operation.

UK police have been given the names and addresses of 7,272 individuals who used credit cards to pay for indecent pictures of under age children on Web sites seized by the FBI last year, The Telegraph reports. ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.