logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
24th August 2018 by CyberVision 0 Comments 916 Views
24th August 2018 by CyberVision in Business Security

Spam is on the rise – Again!

spam

 

Email spam is once again the most popular choice for sending out malware. If you’re going to encounter malware in 2018, chances are it will happen through spam. Digital spam has been around for more than four decades and has remained as one of the main infection vectors. “During the past few years, it’s gained more popularity against other vectors, as systems are getting more secure against software exploits and vulnerabilities,” says Päivi Tynninen, Threat Intelligence Researcher at F-Secure.

According to Päivi, 2018 has proven to be quite a busy year thus far. F-Secure has identified spam samples to consist of dating scams (46%), emails with malicious attachments (23%) and links to malicious websites (31%). F-Secure have also found that there has been considerably less prevalence of ransomware in 2018 than what was found in 2017. “We’ve found that just five file types make up 85% of malicious attachments,” Päivi says. “They are ZIP, DOC, XLS, PDF, and 7Z.”

What is the reason for the spam “resurrection”? Ultimately, it’s because spam works.

It works because criminals are always getting better at understanding what “social engineering” entails. This “social engineering” allows a criminal to employ knowledge of user psychology to improve the design of spam. There are simple tactics that noticeably improve click rates. Spam that seems to come from a familiar name or someone the recipient knows, spam with flawless subject lines and spam that uses a call-to-action where urgency is implied but not emphasized, are all more effective.

People hoping to spread malware have to rely more and more on email spam because of all the improvements made in antivirus and endpoint protection software today. Criminals are now limited to email exploits only, so one should not regard email etiquette as frivolous. Rest assured, spam is one of the least effective methods of infection and can be controlled. Staying on top of email practices and protocols will contribute to the protection of your network.

 

 

 

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • malware
  • ransomware
  • spam
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo