FTC notes malicious spam on the rise

Posted by   Virus Bulletin on   Jan 1, 2008

FTC reports on a decade of spam fighting.

The US Federal Trade Commission (FTC) has released a report reflecting on the ten years in which it has been involved in the fight against spam, detailing the findings of its 'Spam Summit' workshop held last summer, and proposing steps to be taken by stakeholders to mitigate the harmful effects of spam and phishing.

The report notes that the nature of spam - both in terms of the methods used by spammers and their motivations - has shifted over the past decade, with a new generation of malicious spam now on the rise.

The FTC, which has brought more than 90 law enforcement actions against spammers over the past 10 years, promises to continue to bring civil law enforcement actions wherever appropriate and to renew its efforts to work with both the anti-spam and anti-phishing communities.

The Commission calls for collaboration between law enforcement, industry and other stakeholders to be maximized, both domestically and abroad, and for efforts to deploy technological tools to be intensified. Specifically, the report states that the FTC will encourage industry-driven efforts for the widespread deployment of authentication technologies. Finally, the FTC calls for stakeholders to renew efforts to educate consumers about online threats, and to improve methods for disseminating educational materials both to consumers and businesses.

The full report (in pdf format) can be downloaded from the FTC website here.

Posted on 05 January 2008 by Virus Bulletin

 Tags

spam report ftc
twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Subtle change could see a reduction in installation of malicious Chrome extensions

Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions.

Paper: EternalBlue: a prominent threat actor of 2017–2018

We publish a paper by researchers from Quick Heal Security Labs in India, who study the EternalBlue and DoublePulsar exploits in full detail.

'North Korea' a hot subject among VB2018 talks

Several VB2018 papers deal explicitly or implicitly with threats that have been attributed to North Korean actors.

Expired domain led to SpamCannibal's blacklist eating the whole world

The domain of the little-used SpamCannibal DNS blacklist had expired, resulting in it effectively listing every single IP address.

MnuBot banking trojan communicates via SQL server

Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.