This page is powered by Blogger. Isn't yours?

 Feedblitz email:
 RSS: http://linkingintegrity.blogspot.com/atom.xml



Integrity - use of values or principles to guide action in the situation at hand.

Below are links and discussion related to the values of freedom, hope, trust, privacy, responsibility, safety, and well-being, within business and government situations arising in the areas of security, privacy, technology, corporate governance, sustainability, and CSR.

good security education is best prevention, 12.11.04

Junk mailers get the human touch
Analysis of junk mail shows that many messages exploit the hopes, fears and faiths of users to snare victims.

Spam offering pills and cures now accounts for 47% of messages analysed by filtering firm Clearswift.

Analysts say these tactics of "social engineering" are the greatest internet security risk over the next 10 years.

Serious side

Clearswift analysed 19,000 spam e-mail messages and found that increasing numbers were designed to catch people out by playing on the foibles of human personality.

Some appeal to greed by offering the latest "Rolex" watch at a bargain price. Others prey on the naïve by carefully mimicking the look and feel of messages and websites of well-known banks.

These so called phishing scams try to convince users to hand over their online bank details.

Using other well designed and carefully written messages, criminals try to persuade unaware people to click on a link or open a malicious attachment file.

One junk message even offers Christian mortgages in an attempt to shore up its credibility.


Healthcare: 46.9%

Direct Products: 20.8%

Finance: 10.2%

Scams: 7.1%

Pornography: 6.9%

Gambling: 0.5%

Others: 7.6%

Source: Clearswift, October 2004

Some e-mails use subject lines such as "your account details" that are easy to spot, but others are harder to see through. Many people have found that one wrong click opens the door for a deluge of more spam and viruses.

"It makes sense for spammers to target our weak spots," said Alyn Hockey, technical director of Clearswift.

"Though their success rate remains minimal, their constantly evolving tricks means organisations have to increasingly rely on robust e-mail security software to filter out their rubbish,"he said.

With the upcoming Christmas season, online security experts recommend internet users to take extra precautions, not only with e-mail but also with suspicious e-cards.

In early November analyst group Gartner said that the exploitation of people, rather than vulnerabilities in technology, was going to be the biggest security problem that organisations would face over the next few years.


Post a Comment



Integrity Incorporated

Site Feed

 Feedblitz email:

 RSS: http://linkingintegrity.blogspot.com/atom.xml

"We shall need compromises in the days ahead, to be sure. But these will be, or should be, compromises of issues, not principles. We can compromise our political positions, but not ourselves. We can resolve the clash of interests without conceding our ideals. And even the necessity for the right kind of compromise does not eliminate the need for those idealists and reformers who keep our compromises moving ahead, who prevent all political situations from meeting the description supplied by Shaw: "smirched with compromise, rotted with opportunism, mildewed by expedience, stretched out of shape with wirepulling and putrefied with permeation.
Compromise need not mean cowardice. .."

John Fitzgerald Kennedy, "Profiles in Courage"


07.03   08.03   09.03   10.03   11.03   12.03   01.04   02.04   03.04   04.04   05.04   06.04   07.04   08.04   09.04   10.04   11.04   12.04   01.05   02.05   03.05   04.05   05.05   06.05   07.05   08.05   09.05   10.05   11.05   12.05   01.06   02.06   03.06   04.06   05.06   06.06   08.06   09.06   10.06   11.06   01.07   02.07   03.07   04.07   07.07   08.07   09.07   10.07   05.08   06.08