- The plummeted distribution volumes of the Locky Ransomware family
- Country report: Bangladesh and Vietnam
- How suing spammers can be successful, a profile on SF-based lawyer Dan Balsam
- Mobile messaging in the U.S. and the differences between carriers and NUVOs
Virulent Mail Traffic
Country Report 2016 Q2: Bangladesh and Vietnam We examined the spam profiles to Bangladesh and Vietnam – both developing countries have recently come into the security spotlight because of their involvement in bank heists exploiting the SWIFT payment network. Based on our data, Vietnamese and Bangladeshi spammers primarily target Western nations and Vietnamese IPs were the third most prolific Locky senders.Relative Volume of Spam Sent from Each Country, 2016 Q1-Q2
NUVOs and U.S. Mobile Spam In the world of mobile wireless communications, there are two main classes of provider. The first class consists of those operators who own their wireless infrastructure and are typically referred to as Mobile Network Operators (MNOs). In the second class, its operators who don’t own their infrastructure, but instead lease services from one or more MNOs to then resell. Those who contract with only a single MNO are known as a Mobile Virtual Network Operator (MVNOs), while virtual operators who lease services from multiple MNOs are known as Network Unaffiliated Virtual Operators (NUVOs). We examined the messages that were blocked and allowed with members of CTIA. We discovered that NUVOs sends only 9% of legitimate messages and are responsible for 37% of all blocked messages. Gamesmanship, Laziness and Lies, Oh My! Finally, we sat down to speak with a man who hates spam, who decided the ‘delete’ button was no longer satisfying. San Francisco based lawyer, Dan Balsam, has turned fighting spam into a unique career. He has been fighting spam for 14 years and has¬ no plans of stopping – especially since he’s won over $2 million in court judgments and settlements against companies accused of sending spam and now represents dozens of clients in superior court. Interested in hearing more? Register for our webinar next Wednesday, August 16, at 8:30 am PT or 4:00 pm PT. Leading security experts will reveal more highlights from our Q2 Threat Report and also share practical ways to secure your organization from today’s intelligent threats. To read more on each of these topics, the full report is available here.