The domain of using image Spam
for Steganography is yet to be exploited.
BitDefender released the results of its spam and phishing survey from January through June 2008, last year's highly advertised stock spam dropped from 25% to just 2%, while the formerly intrusive image spam
continued its descending trend.
The topics that will be covered during the security forum include next generation reputation system for enterprise; seven design requirements for Web 2.0 threat prevention; comprehensive Web protection; security framework and methodology; network gateway security, identity and access management; and image spam
Two years ago, such "image spam
" consisted of approximately 10% of the total amount of spam.
Worldwide, spam volumes increased as a new breed of junk e-mail called image spam
bypassed traditional spam detectors and reached in-boxes.
The statistics suggest that spammers are increasingly favouring PDF spam over image spam
but they are also experimenting with a range of other attachment types in an attempt to identify which is most effective.
Other new feature enhancements include image spam
protection and data leakage prevention.
It also offers tools designed to prevent image spam
, including multi-pass optical character recognition (OCR) and automated fingerprint generation techniques, as well as Predictive Sender Profiling.
TRACE said the growing amount of image spam
coincides with a fall in the amount of spam containing embedded clickable URL links, which has fallen to around 55% of spam, compared to 96% in 2004.
The other top trends included the resurgence of Image spam
, spread of Chinese language spam and high turnover of zombies with an average of 280,000 per day.
Patent-pending image spam
detection technology, embedded URL reputation, and other cutting-edge approaches protect against emerging spam attacks.
"Engate is impenetrable to threats because its proprietary technology uses protocol information that can never be forged, resulting in a permanent solution for all threats such as image spam
, phish and botnets."