Septic tank spam – the 419 de nos jours?

As if you needed to be told what the spam top ten are...

  • alert
  • submit to reddit

Top three mobile application threats

Anti-spam filtering outfit Brightmail has released a list of the ten most common spam messages assaulting users' in-boxes this year.

Based on volume of messages as a percentage of all spam (monitored through Brightmail's Probe Network of decoy email addresses), the following Subject lines top the list in 2002:

  1. Protect Your Computer Against Viruses for $9.95 - Anti-virus software spam was the most common this year
  2. Verification Department - Credit card scam spam has been very common, especially in recent months
  3. Refinancing? Get a FREE quote on any mortgage loan program - Classic mortgage spam holds its ground
  4. Printer Cartridges - Save up to 80% - Free Shipping Offer - Printer cartridge spam, also a classic, is still one of the top spams
  5. Miniature Remote Control Car. Great Gift! - A newer spam, an email about toy cars for the holidays, has picked up pace in recent months
  6. $100 F R E E, Please Play Now! - Casino spam continued to stake out email inboxes worldwide
  7. Online Auction Marketing Secrets! - Online auction marketing scams bid heavily on email users this year
  8. Important news Kuira - Septic system spam seeped rapidly through the Internet earlier this year
  9. URGENT & CONFIDENTIAL - Nigerian 419 fraud spam asked millions of email
    users to help free-up usurped royal coffers this year
  10. GET A FREE PASS TO THOUSANDS OF XXX SITES! - Pornographic email slithered into inboxes, including those of children

    So if you've received multiple copies of these various spam messages, at least there's the comfort of knowing you're not alone.

    "In 2002, we saw classics like the 'Printer Cartridges' and the 'Nigerian Scam' spam messages reach exceptionally high volumes while newcomers 'Septic System' and 'Remote Control Cars' made big debuts," explained Ken Schneider, CTO at Brightmail.

    Brightmail cautions that in many instances spammers are not who they seem to be. (Er, hello? - ed)

    Many times the companies named in the 'From' line, 'Subject' line or in the header are in no way associated with the senders of spam (good heavens, this is new stuff - Ed again). Spammers use well-known brands to draw attention and attach credibility to their scams or unauthorised marketing. Furthermore, spammers have had to become increasingly sophisticated in 2002, partly in response to a worldwide backlash against the dramatic rise in spam.

    "With legislators, regulators, technologists and individual email users pitted against them, spammers have had to hide behind digital identity theft," the company notes. ®

    Related Stories

    Spammer gets junk mailed
    Study debunks e-mail overload myth
    We hate Spam (email your friends)
    Where the heck is all this spam coming from?
    Nigerian 419 fraudster baiting - Olympic sport?

    Other Links

    Fight back against Nigerian fraudsters with our limited edition "Ghostly 419" T-shirt from Cash'n'Carrion

Top three mobile application threats

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story


Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.