Report: 80 percent of emails out to manipulate

Powered by SC Magazine
 

Four out of five inbound emails are designed to deceive the recipient, according to a new report studying the scope of abusive online messages.

The Messaging Anti-Abuse Working Group's (MAAWG) Email Metric Report, which analyzed data from more than 127 million mailboxes during last year's fourth quarter, found that more than 142 billion emails either were tagged or blocked before they reached the end user.

Another 61.3 billion emails were the victims of dropped connections, the study showed. Nearly 37 billion emails were unaltered before reaching their destination.

"Using this data, we intend to develop better tools, policies and practices within each of our respective organizations," said Charles E. Stiles, MAAWG's co-vice chairman and senior technology manager for America Online's mail operations. "Collectively, our customers will benefit from this added insight and the industry as a whole will benefit from learning how best to deal with the ongoing problems of messaging abuse."

This marks the first time MAAWG conducted such a study, and the San Francisco-based trade group said it plans to continue assessing new data each quarter.

"The first report includes metrics provided voluntarily by nine MAAWG-member ISPs and network operators worldwide," the organization said. "Future reports will be expanded to include additional ISPs. MAAWG is particularly suited to the task of measuring abusive email levels because it is the largest global trade association focusing on this problem." 

Copyright © SC Magazine, US edition


 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 309

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote