* A good deal of spam is sent from compromised systems, and you can stop it A recent Sophos analysis found that the U.S. produces far more spam than any other nation on earth.The study found that almost 57% of spam is generated in the U.S., followed by Canada at just under 7%, Hong Kong and China at 6.2% and South Korea at 5.8%.An interesting finding of Sophos’ research is that more than 30% of spam is sent from computers that have been infected with a worm or Trojan horse and so are used as proxies for sending spam, completely unbeknownst to their owners.Part of the reason for the rapid increase in spam is the adoption of broadband in the home. The availability of these “always on” connections, coupled with the fact that too few home users have adequate firewall protection, presents an abundant opportunity for spammers to plant worms and Trojans and thereby use home-based computers for spreading spam. I suspect that South Korea placed so high on the Sophos list because that country is one of the heaviest users of broadband on a per-capita basis. Demonstrating the vulnerability of even a single computer to attack is the desktop machine in my office – as I write this, March is about 65 hours old and this computer has been on for about 54 hours during that period. Thus far, my firewall has blocked 243 separate “inbound events,” or attempts to access a port on this computer.Of course, the best thing that any individual can do to stop the spread of spam is never to buy anything advertised in a spam message. Cutting off the flow of cash to the people who send this stuff will change the economics of spam in the most fundamental way by making spamming financially unattractive. Other things that individuals can do is to make sure that anti-virus, anti-spam and firewall protection is installed and up to date, particularly for systems with a broadband connection. These steps sound so obvious that I’m hesitant to even include them here, but the ability of virus writers and spammers to exploit these vulnerabilities is testament to how many people don’t implement even these most basic of safeguards. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe