Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

· "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, DDoS, Education, eLearning, Europe, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, ICT Awareness, Identity Theft, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Proactive Thinking, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Spam, Spampionship, Students 21st Century Survival Guide, Sustainability, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi
Authors

.

Learning basics of IT-Security and Cyber-Security.


WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?

globe-pc

.

To understand the impact of Cyber-Security, Cyber-Crime, Cyber-Attacks, Spam, on a global view it is important to know which countries are involved. WE will see this through the below published graphics and related articles by professional companies. Those articles and graphics will get presented by year publishing and so making it possible to see if there is an improvement (if so…). WE will get the possibility ALSO to learn about the mentioned, such as Spam, web site vulnerability scan , botnet, and…

.


2015: “Dirty Dozen” SPAMPIONSHIP

So here are the results for Q1 (January-February-March 2015) of 2015.

.

SPAMPIONSHIP-Q1-2015

Click on above image, please, to access the article.


 

2014: “Dirty Dozen” SPAMPIONSHIP

So here are the results for Q3 (July, August, September) of 2014.

.

2014-q3-dirty-dozen-by-pop-vol-0500Click the image above to access the article from SOPHOS.

.

2014-q3-dirty-dozen-by-pop-eng-0500

.


2013: Top 10 Countries with the Most Number of Botnet C&C Servers

.

2013-101112-spamvol-eng-0500

.

 

.

Top 10 Countries with the Most Number of Botnet C&C Servers

Image credit => http://www.trendmicro.com/us/security-intelligence/current-threat-activity/malicious-top-ten/ <=

.

WHAT is a Botnet?

.

WHAT is a C&C Server?

.

Check also the video below, please.

.

Video-Botnets

Click the image to access the video.

.


2013: Top 10 Countries with the Most Number of Botnet-Connected Computers

.

Top 10 Countries with the Most Number of Botnet-Connected Computers

Image credit => http://www.trendmicro.com/us/security-intelligence/current-threat-activity/malicious-top-ten/ <=

.


Botnet Control Servers Span the Globe

.

botnet_map

Click image to go to the article.

.

Click the image above to find out if YOUR country is involved.

Read ALSO:

.


2013: “Dirty Dozen” SPAMPIONSHIP 

[START Text from SOPHOS] At the end of each calendar quarter, we dig into our spam databases and calculate each country’s scores in a league table we jokingly call the SPAMPIONSHIP.

Unlike conventional sporting events such as the Superbowl, the Six Nations or the Bundesliga, the Spampionship is one title that no team wants to win. [END Text from SOPHOS]

.

2013-101112-spamvol-eng-0500

Click image to read the article.

.

.

2013-101112-spampop-eng-0500

Click image to read the article.

 


WHAT YOU Should Know About Spam

sharing-iconI will use again the text from SOPHOS, as it explains BEST what SPAM is:

Spam is almost always sent by regular computers – in other words, by desktop or laptop computers at home or at work – rather than by dedicated email servers.

You’re probably familiar with the process by now:

  1. Your computer gets infected with a bot, also known as zombie malware.
  2. The bot “calls home”, typically using a simple web download, to fetch a spam message and a list of addresses to send it to.
  3. The bot sends the message over and over again, using your computer and your internet connection to clock up the mail deliveries.
  4. GOTO 2.

.

I invite YOU also to read my tutorial on How-To fight SPAM:

.


This blog post will get updated as soon as there will be new information.

 

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

 


..

Keywords necessary for me to remember about to create this blog post: Spam, Cyber-Security, Web-Attacks, related links, curation, Malware, Malware-Hosting countries, knowledge links, Cyber-Espionage, Privacy…

.

.

Stay tuned for next blog post(s) 😉

.

 

.

.

.

.

3 Comments

Comments RSS

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s