Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The State Of Spam: Page 6 of 8

The startup inadvertently made matters worse by redirecting all Web traffic from its company home page to its TypePad blog. The DoS attacks followed right along, bringing down not only Blue Security's blog, but millions of others hosted by TypePad and LiveJournal. Not long after, Blue Security threw in the towel and shut down operations.

-- Valerie Potter

Taking On Phishing
One of Microsoft's latest tactics to tackle spam, particularly phishing attacks, is Sender ID, an authentication technology protocol that validates the origin of e-mail by verifying the IP address of the server sending the message against a registered list of servers that the domain owner has authorized to send e-mail. The ISP or recipient's mail server automatically performs the verification before delivering messages.


The State Of Spam


•  Introduction

•  Phishing Comes To The Fore

•  America, The Spam Leader

•  Hidden Costs

•  How Not To Fight Spam

•  Taking On Phishing

•  A Bleak Outlook

"We're paying more attention to reputation of the sender," Scarrow says. "That has been a really big deterrent for phishing. We're seeing people who really want to protect their brands -- eBay, PayPal, banks, e-marketers -- using Sender ID." Nearly one-third of Hotmail traffic has Sender ID attached to it, says Scarrow.

However, Sender ID is just one of three approaches to sender authentication -- along with Sender Policy Framework and Domain Keys Identified Mail -- under review by the Internet Engineering Task Force, an international standards organization.

Sender ID is the least useful of the three, according to Arabella Hallawell, a research vice president at Gartner. She says that DKIM is the most comprehensive of the three authentication methods and is gaining the fastest adoption rate among financial services companies and other spoofing victims.

Hallawell adds that e-mail authentication standards in general are much better at preventing phishing than spam. She believes that an arsenal of spam detection also should include connection-management techniques, which examine the traffic patterns and history of a domain-sending e-mail. This is an important step because not all spammers hijack domains.