Skip to main content

Adobe, Java Product Flaws Still a Threat as Spam Levels Decrease

A latest report has suggested that volume of spam attacks have gone down over the duration of one year, however, exploitation through loopholes in Java and Adobe’s products remain as it is.

A half yearly report launched by M86 Security has revealed that spam volumes have decreased sharply and have remained very low post the shutdown of, in September, last year.

The Labs report for the months between January and June 2011 has revealed that Spam Volume Index (SVI) during the mentioned time is 2000, which is less than half of the previous SVI that used to be 4000-6000. The low down is the result of law enforcement authorities coming down heavily on flourishing botnets last year.

"The legal action taken by Microsoft during the Rustock takedown sent promoters of illegitimate pharmaceutical websites a strong message, perhaps making this option less attractive for spammers. It may be that competing affiliate programs in other categories are now more financially attractive for the spammers." the Labs report read.

However, despite all efforts, spammers continue to exploit loopholes and flaws existing in the age old Java, Adobe and Microsoft softwares to achieve their ends. The most common exploit was for Internet Explorer based on an ActiveX code. This exploit was followed by Adobe Reader Exploits between 2007 and 2010.

Ravi Mandalla was ITProPortal's Sub Editor (and a contributing writer) for two years from 2011. Based in Ahmedabad, India, Ravi is now the owner and founder of Parity Media Pvt. Ltd., a news and media company, which specializes in online publishing, technology news and analysis, reviews, web site traffic growth, web site UI. Ravi lists his specialist subjects as: Enterprise, IT, Technology, Gadgets, Business, High Net Worth Individuals, Online Publishing, Advertising, Marketing, Social Media, News, Reviews, Audio, Video, and Multi-Media. He has also previously worked as Dy. Manager - IT Security at (n)Code Solutions.