Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Red Condor Reveals the Online Threat Scenario of 2009

Fresh news reports by the Internet security firm Red Condor, published during the 3rd week of December 2009, reveal that 2009 has been conspicuous for various advancements in technologies related to e-mail archiving and spam-fighting. Also, the year has been marked with numerous instances of blended-threat e-mails.

According to Red Condor, of the different spam patterns which the security company noted during 2009, spam and phishing incidences involving Web 2.0, social networking and social media sites have grown in number. Hackers and spammers have been exploiting the increasing comfort and trust in Twitter, MySpace, Facebook, craigslist as well as Internet job sites to trap users in spam campaigns.

With the approaching holiday season and seeing the seriousness of the situation, President and CEO of Red Condor Dr. Thomas Steding stated that while spam kept on being a doom for e-mail users, it was evolving as well. Pr-inside.com published this during the 2nd week of December 20009.

It's worth noting that spam artists, over a period of time, have been occupied with selling fake branded purses, watches and other products. The upcoming holiday would be no exception; rather there would be, like during any holiday, an immense opportunity for spammers to deceive online shoppers.

One instance of duping online shoppers during vacations is through e-greeting cards and other scams, since people prefer these cards and trust websites such as BlueMaountain.com.

Reportedly, in October 2009, nearly 22 Million U.S. residents visited e-card websites. Of this, approximately 3.6 Million visited American Greetings websites, including BlueMountain.com.
Additionally, there has been a worsening situation as far as phishing attacks are concerned, with Red Condor forecasting a further growth in them during 2010.

However, these spurious assaults can be mitigated. Red Condor highlighted that consumers can detect phony e-mail by looking for grammatical and spelling mistakes in the messages.

Also, users must be careful with e-mails having "secret admirer" in the "from" field as these represent scams of the current times. Besides, they must have their PC programs up-to-date and install all relevant security applications, experts advised.

Related article: Red Condor Alerts Users of a New Virus in a Twitter Invitation

ยป SPAMfighter News - 12/25/2009

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next