Avoiding Spam Wilmington NC

Spammers are getting around improved filtering systems, according to Cyberoam, a division of Elitecore Technologies.

Staples
(910) 313-3160
5613 Carolina Beach Rd Ste 140
Wilmington, NC
Recycling Services
Recycling Desk
$3 Ink & Toner Credit
Hours
Mon-Fri: 8:00am-9:00pm Sat: 9:00am-9:00pm Sun :10:00am-6:00pm

SLK Computer Solutions
(910) 620-5055
4605 Bainridge Court
Wilmington, NC
 
Cadre Systems Inc
(704) 523-3339
11121 Carmel Commons Boulevard #320
Charlotte, NC
Services
Computer and Equipment Dealers, Computer Software, Computer and Software Stores

Data Provided by:
HJR_SOFTWARE
(704) 579-6102
Onsite Computer Services - We Do It All!
Charlotte, NC
Services
Computers and Equipment Repair and Maintenance, Web Site Hosting, Computer Software, Internet Service Providers, Web Site Design
Hours
Mon 10:00 AM-10:00 PM
Tue 10:00 AM-10:00 PM
Wed 10:00 AM-10:00 PM,

Data Provided by:
Outland Computers
(828) 399-1767
Cullowhee, NC
Services
Computers and Equipment Repair and Maintenance, Computer Upgrade Services, Computer Hardware and Supplies, Computer Software, Computer Networks
Hours
Mon-Sat: 09:00 AM-09:00 PM

Data Provided by:
Staples
(910) 313-0636
322 South College Road
Wilmington, NC
Recycling Services
Recycling Desk
$3 Ink & Toner Credit
Hours
Mon-Fri: 8:00am-9:00pm Sat: 9:00am-9:00pm Sun :10:00am-6:00pm

Patron Software
(877) 898-3981
201 Lawton Ct.
Wilmington, NC
 
Visionet Online Service
(919) 732-9885
512 Us Highway 70 East
Hillsborough, NC
Services
Internet Products and Services, Internet Services, Computer Hardware and Supplies, Computer Software, Internet Service Providers

Data Provided by:
Computer Troubleshooters
(336) 510-7919
1400 Battleground Ave. Suite 112-H
Greensboro, NC
Services
Information Technology Services, Computers and Equipment Repair and Maintenance, Computer Hardware and Supplies, Computer Software, Computer Networks
Hours
Mon 10:00 AM-06:00 PM
Tue 10:00 AM-06:00 PM
Wed 10:00 AM-06:00 PM,

Data Provided by:
Direc Way
(800) 204-1669
Laurel Hill, NC
Services
Satellite Equipment and System Dealers, Internet Services, Computer Hardware and Supplies, Computer Software, Consumer Electronics Stores

Data Provided by:
Data Provided by:

Avoiding Spam

By Jared Heng, CIO.com,

Spammers are getting around improved filtering systems, according to Cyberoam, a division of Elitecore Technologies.

Instead of sending e-mail from a known spam IP address or infected bot server, spammers have found ways to do so from legitimate mail servers and domains, Cyberoam noted.

The unified threat management (UTM) solutions provider said that spammers would steal legitimate e-mail senders' credentials, compromising e-mail account enrollment processes. Consequently, the spammers could automatically register thousands of free e-mail accounts mainly by using algorithms to break CAPTCHAs meant to eliminate mass automated registrations.

In particular, malware hidden in legitimate sites is on the rise, Cyberoam said.

Perpetrators also play on user psychology and curiosity by sending spam content such as gruesome videos, doomsday announcements, celebration days, love mails and celebrities' information.

Sinister attack methods

According to Cyberoam, malicious content like flash spam is often hosted on legitimate sites that had been hacked. Such content may also be hosted on popular public platforms like Blogspot or Flickr, taking advantage of security solutions' reluctance to generate false positives.

"Given the blended nature of attacks, unified security that includes anti-virus, anti-malware and content filtering solutions provide second and third layers of protection," said Abhilash Sonwane, Cyberoam's vice president of product management. "Such security prevents downloads of malware from websites and prevents users from accessing malware-laden sites inadvertently."

Sonwane said that having a strong anti-spam solution at the gateway stops spreading of spamware through official e-mail addresses. "However, malware-linked spam can still slip in through personal e-mail accounts."

"Building user awareness and enforcing responsible surfing behavior in corporate networks prevents such threats significantly," Sonwane said.

Ironically, spammers have also played upon users' desire to defend themselves against web-based threats, Cyberoam noted.

For example, an e-mail like 'admin@microsoft.com' was designed to look like a notification update for the popular IE7 web browser, complete with a disclaimer from the Microsoft site. However, users who clicked on the link were hit with a nasty executable file.

Blocking bots

According to Cyberoam, reputation-based solutions are continuously improving in ability to block bots, with about 55 per cent of bots having a lifespan as short as one day. However, Cyberoam also noted that such solutions need to be continuously updated to maintain accuracy.

The UTM solutions provider claims to use Commtouch RPDTM technology to analyse large volumes of internet traffic in real-time. Unlike traditional spam filters, the technology does not rely on e-mail content, and is hence able to detect spam in any language, and in every message format, Cyberoam said.

Cyberoam also claims to incorporate this technology within its identity-based UTM appliances.

Copyright © 2008 IDG. All rights reserved.