Criminal expeditions

The Asia-Pacific region is seeing repeated attacks launched from fraudulent email and #8220;that is just the beginning,#8221; Brightmail#8217;s Garry Sexton warns. Authorities need to attack the people behind the #8220;criminal side of spam#8221;, as these could adversely affect business communications #8211; particularly those of networked enterprises, says Sexton, vice president Asia-Pacific of the anti-spam software and services firm.

#8220;Anybody doing e-related business from government departments to commercial enterprises has the potential to be phished. If you can#8217;t trust the person you#8217;re dealing with, that#8217;s the end of the internet as a business medium.#8221;

Email tricks

Sexton says there has been growth in fraudulent and phishing email in recent months. In November 2003, Brightmail tracked 860 million email messages determined to be of the phishing variety, and the figure reached more than two billion in March 2004.

In the Asia-Pacific region, around 5 per cent of all spam falls into the fraud category, meaning it contains messages designed to trick users into revealing sensitive information, such as financial data and passwords.

Brightmail filters around 15 per cent of all internet email traffic worldwide. It claims to block over 95 per cent of spam, using technology to identify and automatically distribute spam-blocking updates every 10 minutes, with a false positive rate of 99.9999 per cent (one in a million email messages is incorrectly classified as spam).

Sexton says once Brightmail identifies an email as fraudulent it can write a filter, post it to ISP sites and block future instances to mitigate the damage. He claims the company is able to provide a filter of sufficient quality to prevent false positives within 10 minutes.

He says, however, this is just the #8220;technology side#8221; of helping control the problem. The company aims to work with local government and police in the region to provide them with information to help them prosecute the fraudsters.

Sexton believes the company has its finger on the pulse of these attacks. #8220;We have to work with government and government agencies in providing them with this information.#8221;

Copyright © 2004 IDG Communications, Inc.

6 digital transformation success stories