Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Carmen Gonzalez, Elizabeth White, Jason Bloomberg

News Feed Item

'Hey, Why Did You Reply to that Spam?' Anti-Spam Group MAAWG Surveys Consumer Email Behavior and Security Awareness

SAN FRANCISCO, July 15 /PRNewswire/ -- Everyone asks, "who would be so reckless as to click on this junk?" but almost a third of consumers admitted to responding to a message they suspected might be spam, according to a survey released today by the Messaging Anti-Abuse Working Group (MAAWG). Also alarming, about 80 percent of users doubted their computers were at risk of ever being infected with a "bot," which is a covertly planted virus capable of sending spam or causing other damage without the owner's knowledge.

(Logo: http://www.newscom.com/cgi-bin/prnh/20070124/CLW180LOGO )

The results indicate a lack of awareness among consumers since industry reports indicate bots are responsible for generating much of today's illegitimate email. MAAWG commissioned the study, "A Look at Consumers' Awareness of Email Security and Practices," to gauge users' understanding of messaging threats and to identify how best to work with users in removing bots and viruses from infected systems. The report is based on 800 interviews with computer users in the United States and Canada who said they were not "security experts" and who used email addresses that were not managed by a professional IT department.

The survey data creates a picture of users familiar with general email-based threats but not necessarily as alert or cautious as they should be to proactively protect themselves against spam, online fraud and other email-related hazards. There also is no general consensus among consumers as to how network operators and industry vendors should interact with customers when addressing these issues.

"Spamming has morphed from an isolated hacker playing with some code into a well-developed underground economy that feeds off reputable users' machines to avoid detection. Consumers shouldn't be afraid to use email, but they need to be computer smart and learn how to avoid these problems," said MAAWG Chair Michael O'Reirdan.

About two-thirds of the consumers surveyed considered themselves "very" or "somewhat" knowledgeable in Internet security. While most consumers use anti-virus software and over half said they never click on suspected spam, the survey also found that 21 percent take no action to prevent abusive messages from entering their inbox. A majority of consumers, 63 percent, would allow their network operator or anti-virus vendor to remotely access their computer to remove detected bots.

Offers a Framework for Working with Subscribers

Ferris Research, Inc., an industry analysis firm that tracks messaging issues, provided additional recommendations in the report for service providers and vendors based on the survey findings. Among their suggestions is that network operators and vendors consider offering remote bot mitigation capabilities to differentiate their services from competitors. Vendors also might consider refining spam filters based on the specific patterns defined in the study.

For example, the MAAWG survey found that users between the ages of 24 and 44 are more likely to use email for banking and bill statements, so industry vendors might focus on preventing phishing spam for these consumers.

Ferris Research Principal David Ferris said, "According to the MAAWG findings, about one in six people are prepared to make an effort to report spam and the industry should find more ways to tap into this potential. Conversely, the volume of people who still respond to spam is regrettable because it's an economic incentive to spammers," he said.

This is the first consumer survey commissioned by MAAWG, which is the largest global trade association tackling messaging abuse. Bots are one of the fastest growing email security issues.

The complete 60-page survey report, "A Look at Consumers' Awareness of Email Security and Practices or 'Of Course I Never Reply to Spam, Except Sometimes'" includes graphs, detailed findings and analysis. It is available today at no cost on the MAAWG Web site, www.MAAWG.org.

About the Messaging Anti-Abuse Working Group (MAAWG)

The Messaging Anti-Abuse Working Group (MAAWG) is where the messaging industry comes together to work against spam, viruses, denial-of-service attacks and other online exploitation. MAAWG (www.MAAWG.org) represents almost one billion mailboxes from some of the largest network operators worldwide. It is the only organization addressing messaging abuse holistically by systematically engaging all aspects of the problem, including technology, industry collaboration and public policy. MAAWG leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services. Headquartered in San Francisco, Calif., MAAWG is an open forum driven by market needs and supported by major network operators and messaging providers.

Media Contact: Linda Marcus, APR, +1-714-974-6356, [email protected], Astra Communications

MAAWG Board of Directors: AOL; AT&T (NYSE: T); Cloudmark, Inc.; Comcast (Nasdaq: CMCSA); Cox Communications; France Telecom (NYSE and Euronext: FTE); Goodmail Systems; Openwave Systems (Nasdaq: OPWV); Time Warner Cable; Verizon Communications; and Yahoo! Inc.

MAAWG Full Members: 1&1 Internet AG; Bizanga LTD; Constant Contact; e-Dialog; Eloqua Corporation; Experian CheetahMail; Genius.com; Internet Initiative Japan, (IIJ Nasdaq: IIJI); IronPort Systems; McAfee Inc.; MX Logic; NeuStar, Inc.; Outblaze LTD; Return Path, Inc.; Spamhaus; Sprint; and Symantec

A complete member list is available at http://www.maawg.org/about/roster.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Microservices Articles
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
Many organizations are now looking to DevOps maturity models to gauge their DevOps adoption and compare their maturity to their peers. However, as enterprise organizations rush to adopt DevOps, moving past experimentation to embrace it at scale, they are in danger of falling into the trap that they have fallen into time and time again. Unfortunately, we've seen this movie before, and we know how it ends: badly.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...