07:30 PM
Connect Directly

Our Take: Any Spam is too Much

Spammers are refining their tactics. IT must do the same.

Spam is big business, and economics are in the bad guys' favor. Say a spammer blasts 100 million messages. If just 1% get through, and 1% of those are answered, that amounts to 10,000 responses. No other advertising is as cost-effective, so to win we must turn the economics of spam around.

Problem is, anti-spam systems lose effectiveness as the volume of e-mail increases. Filters may be just as successful as always, says Greg Olsen, director of product management at Sendmail. But the rub is that, with twice the spam this year as last, a filter that lets only 10% through will be allowing twice as much junk. Users--including those who sign the checks for new purchases--will notice the increase, and this is keeping anti-spam vendors we spoke with awake at night.

InformationWeek Reports

Make no mistake: It's an arms race. Spammers are constantly developing new techniques, employing professional software developers, and investing in technology to create the sophisticated systems needed to evade controls. In 2007, we saw the damage done by botnets, armies of infected computers that enable spammers to avoid the expense of purchasing Internet connectivity and the hassle of having that connectivity shut off once the ISP realizes what's going on. Another dark benefit of botnets is that spam is sourced from many different nodes, making it much harder to choke the flow. The Storm worm, with morphed versions appearing constantly, reflects a new trend of all-purpose botnets, in which infected computers download their tasks from a central controller.

As for technique, image and attachment spam has largely been replaced by link spam. These messages include some teaser text and a Web URL that delivers a one-two punch in that the Web pages often use browser bugs to infect the recipient's computer, adding it to the botnet. With link spam, the botnet tactic pays off twice for spammers, as they can direct part of their botnets to act as Web servers hosting the pages and malicious code.

Return to the story:
E-Mail In Peril

Comment  | 
Print  | 
More Insights
IT's Reputation: What the Data Says
IT's Reputation: What the Data Says
InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Must Reads Oct. 21, 2014
InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A roundup of the top stories and community news at InformationWeek.com.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.