Gold Country Computer Learning Center March 2007 Spam Email Roger Thornburn.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Basic Communication on the Internet:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Anyone can learn to use . How Works Snail Mail vs Snail Mail AddressFred Flintstone 202 Rubble Drive Flatrock 7111
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
Netiquette Rules.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
CLIENTS Advantages Setup Features. Advantages Allows programs and websites to use “default ” Scanners Picture Programs Word Processing programs.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Internet safety By Lydia Snowden.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Strategies and Google Voice Lake County Area Computer Enthusiasts Characteristics of the 2 types: Webmail Local Client Basic etiquette Google.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Don’t Be “Phooled” By Phishing Federal Trade Commission National Consumers League Microsoft Corporation March 31, 2005.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Microsoft Windows 7 - Illustrated Unit G: Exploring the Internet with Microsoft Internet Explorer.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Internet Business Associate v2.0
Learn how to protect yourself against common attacks
MICROSOFT OUTLOOK and Outlook service Provider
How to manage your s Tips and tricks.
THE BASICS.
Huntington Beach Public Library
Information Security Session October 24, 2005
Ethics Tutorial Assignment#2
Introduction to Web-Based
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
ICT Communications Lesson 5: Communicating Using
Internet Safety – Social Media
How to manage your s Tips and tricks.
How to manage your s Tips and tricks.
Presentation transcript:

Gold Country Computer Learning Center March 2007 Spam Roger Thornburn

Gold Country Computer Learning Center spam Roger Thornburn March What is Spam Needs to meet 2 requirements Unsolicited Bulk Name comes from a Monty Python skit Monty Python's spam video Monty Python's spam Mostly commercial 25% - Products20%- Financial 19% - Adult9%- Scams 7%- Health7%- Internet Not Spam: Jokes from friends Newsletters you signed up for

Gold Country Computer Learning Center spam Roger Thornburn March A Few Statistics Amount of Spam 90 Billion spam s a DAY (Feb 2007) Average of 50 spam s a day – per address 94% of all is spam Sources of Spam US – 23% China – 20% Russia -10% South Korea – 6% Surprise! 28% reply to spam 8% purchase from spam

Gold Country Computer Learning Center spam Roger Thornburn March Current Situation IP addresses last 4 hours June 2006 – 35M new domains, 32M not paid Hi jacked mail servers – listed as spammers Creates problem for legitimate users Use of “Zombie” PC’s and the Botnet Maybe 1 in 4 PC’s infected. Image spam Hard for a computer to read Hi growth from 0 to 25% of spam Getting your address Dictionary attackSpam bots (websites) Infected computersVendors/subscriptions

Gold Country Computer Learning Center spam Roger Thornburn March Spam Safety tips Encrypt your address (not in a dictionary) Use a fake address where possible Use bcc to send an to many people Don’t open spam and set Outlook Express to “Block images…..” Avoids confirming your Don’t reply to spam – again it confirms you’re real! Don’t post your address on a website. Uncheck all those “subscribe” boxes Unsubscribe from reputable companies only Use a spam filter

Gold Country Computer Learning Center spam Roger Thornburn March Spam Filtering Techniques Rules based Matches specific words in the To, From, Subject or Body of the Very specific – can only make an exact match Bayes filter/Fuzzy logic Uses a mathematical set of probabilities, gathered from being told what’s “spam” and what’s “ham” Needs to “learn” and kept up to date Black list Blocks specific “From” addresses. Not very effective today – new domain every 4 hours! Good for blocking family/friends or newsletters

Gold Country Computer Learning Center spam Roger Thornburn March Spam Filtering Techniques (cont.) On-line Database (DNSBL) Can work well - if accurate. Can easily stop legitimate s as well. Signature analysis for specific s White list List of addresses you will accept from Challenge/response systems Needs to be kept up-to-date Most effective method Important!: No spam filter is perfect. The worst thing is putting legitimate s in your Spam/Junk/Bulk mail folder. It’s essential to check this folder so you can receive your good , as well as train the filter.

Gold Country Computer Learning Center spam Roger Thornburn March Reducing Spam in Real Life! Different if using Web mail or POP mail Web mail is when you use your internet browser (Internet Explorer or Firefox, etc) to read and send your . POP mail is when you use an client (a program such as Outlook/Express, Thunderbird, Endura, etc.) to read and send your . With POP mail, the messages are downloaded to your computer – can be read and new ones composed, without beeing connected to the internet. To read or compose messages in Web mail, you must be connected to the internet Many accounts can be accessed by either/both

Gold Country Computer Learning Center spam Roger Thornburn March Web Mail All your stays on the Web mail server You have little control Large providers such as Yahoo, Google, Hotmail, etc. provide excellent spam filtering – using a combination of all the above techniques Any legitimate s in the spam/junk box, must be identified – now added to your white list Yahoo has AddressGuard Create a separate address for each person or class of persons Many of the smaller ISP’s/ providers, aren’t as sophisticated.

Gold Country Computer Learning Center spam Roger Thornburn March POP 3 Spam filter sits between the mail server and your client Many ISP’s or servers have own spam filter Yahoo (SBC, AT&T, Pacbell, etc.) use same as Web mail Can be harder to check spam folder – may need to configure Huge selection of programs – freeware to $$’s Use different techniques – either singly or in combination. Some are tightly integrated to the client

Gold Country Computer Learning Center spam Roger Thornburn March POP3/Outlook Express Examples Outlook Express –Rules Text matching – limited Good for White list – can import address book K-9 Freeware Uses Bayesian technology – so must train Plus has White list and Black list Regex filters for advanced users Easy interface – but not elegant Computer Associates ($30) White list Integrated to Outlook/Express – easy to use

Gold Country Computer Learning Center spam Roger Thornburn March More Examples MailWasherPro ($30) Freeware version available Combination of Bayes, White list, Black list, DNSBL, User filters and Signature Reviews on the server Spam is removed before download Save time with dial up Easy to use

Gold Country Computer Learning Center spam Roger Thornburn March Phishing Scams to trick users to reveal personal information Normally an official looking Directed to a fraudulent website Losses from phishing attacks: $137 million$2.8 billion # US adults who received at least one phishing 57 million 109 million Number of victims:53 thousand2.25 million Per-victim loss:$257 $1,244 Money recovered by consumers: 80% 54% Don’t click a link in an Call your bank or credit card company if suspicious Check the website is secure (

Gold Country Computer Learning Center spam Roger Thornburn March Useful Links Wikipedia Reference Links to resources and anti-spam filters More links to many anti spam resources (More spam filters) Review of some spam filters Freeware Bayes filter (plus White and Black list) Computer Associates anti spam program (Or Google ca spam). Paid, easy to use White list – integrates to Outlook Express. Mail Washer free and paid anti-spam versions. Uses multiple methods for detection Spam Butcher – fuzzy logic anti-spam

Gold Country Computer Learning Center spam Roger Thornburn March Summary Web mail Dependant on the ISP/Web mail provider Larger providers often provide configurable options Yahoo AddressGuard is a good solution MUST go into JUNK/BULK/SPAM folder to mark good s – regularly POP3 mail Most effective method is White list (or safe senders list) – but needed to be kept up-to-date. Using built in Rules of Outlook Express works fine Purchased product – often more convenient. Above all – Protect Your Address!!