The mail servers that ISPs run require some sort of authentication to make sure that the user is a customer of that ISP. Therefore, spammers seek out and make use of vulnerable third party systems such as open mail relays and open proxy servers since these do not verify the veracity of the users and pass all mail to the destination address.
Quiet often spammers use networks of malware infected PCs known as Zombie networks (or Botnets) to send their spam. In June 2006, Zombie PCs sent an estimated 80% of e-mail spam, which was an increase of 30 per cent from the previous year. Approximately about 55 billion spams were sent each day in June 2006,which saw an increase of 25 billion per day from June 2005.
Quiet often spammers use networks of malware infected PCs known as Zombie networks (or Botnets) to send their spam. In June 2006, Zombie PCs sent an estimated 80% of e-mail spam, which was an increase of 30 per cent from the previous year. Approximately about 55 billion spams were sent each day in June 2006,which saw an increase of 25 billion per day from June 2005.
No comments:
Post a Comment