全国

热门城市 | 全国 北京 上海 广东

华北地区 | 北京 天津 河北 山西 内蒙古

东北地区 | 辽宁 吉林 黑龙江

华东地区 | 上海 江苏 浙江 安徽 福建 江西 山东

华中地区 | 河南 湖北 湖南

西南地区 | 重庆 四川 贵州 云南 西藏

西北地区 | 陕西 甘肃 青海 宁夏 新疆

华南地区 | 广东 广西 海南

  • 微 信
    高考

    关注高考网公众号

    (www_gaokao_com)
    了解更多高考资讯

您现在的位置:首页 > 高考总复习 > 高考知识点 > 高考英语知识点 > 报告显示90%电邮为垃圾邮件

报告显示90%电邮为垃圾邮件

来源:网络来源 2009-08-29 20:57:30

[标签:垃圾 显示]

 

    互联网解决方案提供商思科在其《年度安全报告》中称,由于黑客不断想出控制用户计算机的新途径,被控制的计算机每天会发送大量垃圾邮件,这些垃圾邮件数量达到近2000万封,占全部电子邮件总量的约90%。该报告指出,美国是最大的垃圾邮件“源头”,占到了垃圾邮件总量的17.2%;土耳其和俄罗斯分列第二、三位,所占比例分别为9.2%和8%。

    Armies of hijacked computers are flooding the world with spam as hackers devise slicker ways to take over unwitting people's machines, according to a report released on Monday.

    Virus-infected computers are woven into "botnets" used to attack more machines and to send sales pitches to e-mail addresses in low-cost quests to bilk readers out of cash.

    "Every year we see threats evolve as criminals discover new ways to exploit people, networks and the Internet," said Cisco chief security researcher Patrick Peterson, who was involved in drafting the report.

    Junk e-mail, or spam, accounts for nearly 200 billion messages daily, approximately 90 percent of email worldwide, according to the Cisco Annual Security Report.

    The US is the biggest source of spam, accounting for 17.2 percent messages. Turkey and Russia ranked second and third, accounting for 9.2 percent and 8 percent spam respectively, according to Cisco.

    This year, botnets were used to inject an array of legitimate websites with an IFrames malicious code that reroutes visitors to websites that download computer viruses into their machines.

    "The botnet is, in many cases, ground-zero for online criminal threats," Peterson said. "Using malware to infect someone's computers is an incredibly common mechanism and harnessing them all together is a way they do their click fraud, spam emails, and data stealing."

    Online criminals are turning botnets on web-based e-mail accounts. Hackers are "reputation hijacking" by using botnets to figure out weak passwords protecting web-based e-mail accounts, according to Peterson.

    Weak passwords consist of family names, birthdays, home addresses or other terms considered relatively easy to deduce.

    Once access is gained to legitimate e-mail accounts, a plethora of spam messages are sent in the owners' names.

收藏

相关推荐

高考院校库(挑大学·选专业,一步到位!)

高校分数线

专业分数线