Feeds

Spam drops as legit biz dumps mass email ads: Only the dodgy remain

Small problem: it still makes up two-thirds of email traffic

Website security in corporate America

Spam email was down in volume last year, but junk mail messages still comprise two in three items of electronic communication sent over the interwebs.

Kaspersky Lab reports the portion of spam in email flows was as high as 69.6 per cent in 2013 – which is 2.5 percentage points lower than 2012. The biggest sources of spam were China (23 per cent) and the US (18 per cent), according to the Russian security firm.

The drop in spam mail last year follows a steady decrease since 2010. Kaspersky experts reckons that unscrupulous marketeers are turning away from email because it's becoming a less and less effective medium to promote their dubious wares.

In the last three years, the share of unsolicited messages has fallen by 10.7 per cent. It appears that advertisers increasingly prefer the various types of legitimate online advertising that are now available, which generate higher response rates at lower costs than unsolicited email can offer.

In some spam categories [such as travel and tourism], commercial advertising is being gradually displaced by criminal mailings, such as spam messages advertising illegal goods or pornography.

The percentage of emails with malicious attachments was 3.2 per cent - 0.2 percentage points lower than in 2012. Kaspersky adds that almost a third – 32.1 per cent – of phishing attacks were targeted at social networks. More than occasionally, these malicious missives were disguised as messages from genuine antivirus vendors, featuring attachments contaminated with banking Trojans such as ZeuS.

Darya Gudkova, head of content analysis at Kaspersky Lab, commented: "For the third year in a row the most prevalent malware spread by email were programs that attempted to steal confidential data, usually logins and passwords for internet banking systems. At the same time, however, phishing attacks are shifting from bank accounts to social networking and email."

She added: "This can be partly explained by the fact that today’s email accounts often give access to a lot of content, including email, social networking, instant messaging, cloud storages and sometimes even a credit card."

More details on spam and malicious email trends in 2013 can be found in a blog post on Kaspersky Lab's official Securelist blog here. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.