Spam uses personal style to trick e-mail users
Spammers may be training "zombie" systems to mimic and flush out the same block of spam that the owner of the PC has controlled.
Associate Professor of Computer Science John Aycock and student Nathan Friess at the University of Calgary (Canada) discovered that cyber criminals can fool almost all spam filtering tools after gathering all personal information. on computers such as e-mail writing style, length of messages, habits of using uppercase, abbreviations, signatures .
Aycock and Friess stated the main reason that the system filtered and users recognized spam: "Spam often comes from unidentified sources and looks unreliable. However, the new 'high-end' spam This will change the appearance of spam thanks to the data they have. "
Aycock also emphasized: " The zombie system is not only a springboard for denial of service or spam. They also contain a huge amount of information ."
See John Aycock's report details here.
TN
- Empty spam, PDF spam emerged
- The Trojan couple has increased spam spread rates
- Spam attaches a PDF file to the image spam
- Europe: more than half email is spam
- Phisher takes advantage of IM accounts for fraud
- Spam 'get rich' for recipients
- Business e-mail address in Vietnam
- Following spam images to MP3 spam
- How to handle spam issues in Google Drive
- Vietnam is going to have anti-spam laws
- Automatically check e-mail
- The classic trick via e-mail