Top of Page
In this report we examine an Apache vulnerability and its handling, analyze the SpyEye crimeware kit that is now often used as an attack platform for monetary gain, and examine incidents of the fraudulent issue of public key certificates.
In this report we will present an overview of spam trends for week 27 through week 39 of 2011. As was the case in the previous study, China was the top source of spam.The volume of spam that had been in decline since the latter half of last year also seemed close to hitting bottom during this period.
We illustrate the technical overview of 100 Gigabit Ethernet, which will become necessary in the near future with continuous growth in traffic. We also share the knowledge gained through our joint interoperability test.
End of the page.