Donate

Combating Spam and Mobile Threats

These tutorials discuss the risks in the online and mobile environment that threaten consumers, businesses, and governments every day, and suggests best practices to address these threats.

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support e-government, e-health and e-education. As our laptops, smartphones and tablets have become integrated into our daily personal and business lives, our dependence on these devices has grown. We use the devices to connect to family and friends, shop and bank online, engage with civic agencies and governments, interact with business colleagues and partners, access information and education opportunities and deliver just-in-time products from manufacturing facilities to retail outlets around the globe.

These online tutorials focus on the growing use of mobility to access the Internet, the risks of becoming infected by malware, spreading botnets, redirecting Internet traffic to malicious websites, hijacking cloud and hosting services and inserting spyware onto computers and handheld devices.  It shows how the risk increases and impacts countries and users who are unaware or under prepared to address the problem of spam.  The tutorials will provide you with a better understanding of the online and mobile threats facing governments, businesses and consumers today.

The foundation content for these tutorials was developed by the Messaging, Malware, Mobile Anti-Abuse Working Group (M3AAWG) and London Action Plan (LAP). The online tutorials were developed by the Internet Society in close partnership with the aforementioned organizations.

Who Should Take This Tutorial?

If you are interested in understanding the mobile and online threat landscape.

1. Learn the Basics: Best practices for combating mobile and online threats.

These tutorials explain the best practices for addressing common online threats such as spam, malware, botnets, phishing, DNS and IP exploits, and mobile threats.

2. Watch These Online Tutorials.

Here are five online tutorials to help you develop a basic understanding of the mobile and threat landscape.

Watch them now!

Also please share this page with your followers on Twitter!

Modules

These tutorials discuss the risks in the online and mobile environment that threaten consumers, businesses, and governments every day, and suggests best practices to address these threats.

Module 1: Introduction to Spam

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support e-government, e-health and e-education. As our laptops, smartphones and tablets have become integrated […]

Module 2: Malware and botnets

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support e-government, e-health and e-education. As our laptops, smartphones and tablets have become integrated […]

Module 3: Phishing

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support e-government, e-health and e-education. As our laptops, smartphones and tablets have become integrated […]

Module 4: Domain Name System and Internet Protocol Exploits

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support e-government, e-health and e-education. As our laptops, smartphones and tablets have become integrated […]

Module 5: Mobile Threats

Internet and mobile technologies have been key drivers of the global economy over the past twenty years. These technologies impact almost every facet of our day-to-day lives and have also been integrated into almost every business model and are expanding to support e-government, e-health and e-education. As our laptops, smartphones and tablets have become integrated […]

Acknowledgements

Niel Harper, Messaging Anti-Abuse Working Group (source materials), London Action Plan (source materials), Karen Mulberry, Toral Cowieson, Henri Wohlfarth, Day One Technologies

Join the conversation with Internet Society members around the world