Language Selection

English French German Italian Portuguese Spanish

China joins global effort to can spam

Filed under
Security

The Beijing government has joined the effort to fight spam by adopting the London Action Plan on International Spam Enforcement Collaboration, it emerged yesterday.

Following months of discussions, the Chinese government has finally agreed to sign up to the plan which aims to encourage greater co-operation between countries in analysing spam campaigns, investigating their origin, and encouraging ISPs around the world to take appropriate measures to defend innocent users.

The move was welcomed as a step towards stemming the steadily growing volume of junk mail.

IT security firm Sophos reported in April that almost 10 per cent of spam originated from computers based in China. Much of this is being sent out through compromised computers, known as zombies, under the control of remote hackers without the knowledge of their owners.

"It is great news to hear that China will be joining international efforts to fight spam," said Graham Cluley, senior technology consultant at Sophos.

"After the US and South Korea, China is one of the biggest producers of spam in the world, and greater global co-operation in tackling the scourge has to be welcomed.

"However, computer users need to be aware that the fight is not over, and that they are unlikely to see the amount of spam dry up overnight.

Cluley added that, even if the authorities crack down hard on those using Chinese computers to sell spam-marketed goods, spammers are likely to turn to other countries to flog their wares.

Source.

More in Tux Machines

Android/Google Leftovers

3 open source alternatives to Office 365

It can be hard to get away from working and collaborating on the web. Doing that is incredibly convenient: as long as you have an internet connection, you can easily work and share from just about anywhere, on just about any device. The main problem with most web-based office suites—like Google Drive, Zoho Office, and Office365—is that they're closed source. Your data also exists at the whim of large corporations. I'm sure you've heard numerous stories of, say, Google locking or removing accounts without warning. If that happens to you, you lose what's yours. So what's an open source advocate who wants to work with web applications to do? You turn to an open source alternative, of course. Let's take a look at three of them. Read more

Hackable voice-controlled speaker and IoT controller hits KS

SeedStudio’s hackable, $49 and up “ReSpeaker” speaker system runs OpenWrt on a Mediatek MT7688 and offers voice control over home appliances. The ReSpeaker went live on Kickstarter today and has already reached 95 percent of its $40,000 funding goal with 29 days remaining. The device is billed by SeedStudio as an “open source, modular voice interface that allows us to hack things around us, just using our voices.” While it can be used as an Internet media player or a voice-activated IoT hub — especially when integrated with Seeed’s Wio Link IoT board — it’s designed to be paired with individual devices. For example, the campaign’s video shows the ReSpeaker being tucked inside a teddy bear or toy robot, or attached to plant, enabling voice control and voice synthesis. Yes, the plant actually asks to be watered. Read more

Security News