Feeds

US health-care debate clogged world's inboxes

Pharma-spam cashes in

Securing Web Applications Made Simple and Scalable

When the US debates health care reform, the world's inboxes get clogged with health-related spam.

A recent report (PDF) by security firm MX Logic indicates nearly 70 per cent of spam in August was related to the topic of health. August was the month that saw the debate over proposals to reform US health coverage rage, as Congress broke up for its summer recess and senators and representatives held town-hall meetings with the public that frequently turned confrontational.

The US, meanwhile, held a slim lead over Brazil for being the country producing the most spam.

"By far, health care remained the most prevalent category of spam in August despite decreasing slightly from the previous month," the report said. "Additionally, there was a noticeable resurgence in the number of pharmacy spams that used single inline or attached images (aka - image spam)."

Health-care spam held a solid lead with 68.8 per cent of unsolicited emails. Miscellaneous offers accounted for 12.3 per cent, education 4.4 per cent, gambling 1.3 per cent, and foreign language spam only 1.1 per cent.

The report indicates gambling spam rose more than 50 per cent from 0.8 per cent in July, spurred by people's desire to make a quick buck in shoddy economic conditions.

"Overall spam volume (total number of spam messages) slowed slightly in August, dropping about two per cent. However, it's important to remember that spam volumes have increased fourfold over the last six months. Perhaps more importantly, spam levels (percentage of spam versus all email) inched up to 94.9 per cent of all email sent," the report said.

The US of A continues to lead the world in spam volumes with 13.3 per cent in August. Brazil was a shave away with 13 per cent, and India third at 5.6 per cent.

China meanwhile, who was ranked third last month, fell down to number six in August spam volumes. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.