CINXE.COM

Official Google Cloud Blog: spam and security trends

<!DOCTYPE html> <html class='v2 list-page' dir='ltr' itemscope='' itemtype='http://schema.org/Blog' lang='en' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='http://www.google.com/2005/gml/expr'> <head> <link href='https://www.blogger.com/static/v1/widgets/3566091532-css_bundle_v2.css' rel='stylesheet' type='text/css'/> <title> Official Google Cloud Blog: spam and security trends </title> <meta content='width=device-width, height=device-height, minimum-scale=1.0, initial-scale=1.0, user-scalable=0' name='viewport'/> <meta content='IE=Edge' http-equiv='X-UA-Compatible'/> <meta content='Official Google Cloud Blog' property='og:title'/> <meta content='en_US' property='og:locale'/> <meta content='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' property='og:url'/> <meta content='Official Google Cloud Blog' property='og:site_name'/> <!-- Twitter Card properties --> <meta content='Official Google Cloud Blog' property='og:title'/> <meta content='summary' name='twitter:card'/> <meta content='@gsuite' name='twitter:creator'/> <link href='https://fonts.googleapis.com/css?family=Roboto:400italic,400,500,500italic,700,700italic' rel='stylesheet' type='text/css'/> <link href='https://fonts.googleapis.com/icon?family=Material+Icons' rel='stylesheet'/> <script src='https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js' type='text/javascript'></script> <!-- End --> <style id='page-skin-1' type='text/css'><!-- /* <Group description="Header Color" selector="header"> <Variable name="header.background.color" description="Header Background" type="color" default="#ffffff"/> </Group> */ .header-outer { border-bottom: 1px solid #e0e0e0; background: #ffffff; } html, .Label h2, #sidebar .rss a, .BlogArchive h2, .FollowByEmail h2.title, .widget .post h2 { font-family: Roboto, sans-serif; } .plusfollowers h2.title, .post h2.title, .widget h2.title { font-family: Roboto, sans-serif; } .widget-item-control { height: 100%; } .widget.Header, #header { position: relative; height: 100%; width: 100%; } } .widget.Header .header-logo1 { float: left; margin-right: 15px; padding-right: 15px; border-right: 1px solid #ddd; } .header-title h2 { color: rgba(0,0,0,.54); display: inline-block; font-size: 40px; font-family: Roboto, sans-serif; font-weight: normal; line-height: 56px; vertical-align: top; margin-left:5px; } .header-inner { background-repeat: no-repeat; background-position: right 0px; } .post-author, .byline-author { font-size: 14px; font-weight: normal; color: #757575; color: rgba(0,0,0,.54); } .post-content .img-border { border: 1px solid rgb(235, 235, 235); padding: 4px; } .header-title a { text-decoration: none !important; } pre { border: 1px solid #bbbbbb; margin-top: 1em 0 0 0; padding: 0.99em; overflow-x: auto; overflow-y: auto; } pre, code { font-size: 9pt; background-color: #fafafa; line-height: 125%; font-family: monospace; } pre, code { color: #060; font: 13px/1.54 "courier new",courier,monospace; } .header-left .header-logo1 { width: 128px !important; } .header-desc { line-height: 20px; margin-top: 8px; } .fb-custom img, .twitter-custom img, .gplus-share img { cursor: pointer; opacity: 0.54; } .fb-custom img:hover, .twitter-custom img:hover, .gplus-share img:hover { opacity: 0.87; } .fb-like { width: 80px; } .post .share { float: right; } #twitter-share{ border: #CCC solid 1px; border-radius: 3px; background-image: -webkit-linear-gradient(top,#ffffff,#dedede); } .twitter-follow { background: url(//4.bp.blogspot.com/-8O7VcmcY32o/VSYkC2vUj7I/AAAAAAAAHeU/7mzo-JFgTgk/s1600/twitter-bird.png) no-repeat left center; padding-left: 18px; font: normal normal normal 11px/18px 'Helvetica Neue',Arial,sans-serif; font-weight: bold; text-shadow: 0 1px 0 rgba(255,255,255,.5); cursor: pointer; margin-bottom: 10px; } .twitter-fb { padding-top: 2px; } .fb-follow-button { background: -webkit-linear-gradient(#4c69ba, #3b55a0); background: -moz-linear-gradient(#4c69ba, #3b55a0); background: linear-gradient(#4c69ba, #3b55a0); border-radius: 2px; height: 18px; padding: 4px 0 0 3px; width: 57px; border: #4c69ba solid 1px; } .fb-follow-button a { text-decoration: none !important; text-shadow: 0 -1px 0 #354c8c; text-align: center; white-space: nowrap; font-size: 11px; color: white; vertical-align: top; } .fb-follow-button a:visited { color: white; } .fb-follow { padding: 0px 5px 3px 0px; width: 14px; vertical-align: bottom; } .gplus-wrapper { margin-top: 3px; display: inline-block; vertical-align: top; } .twitter-custom, .gplus-share { margin-right: 12px; } .fb-follow-button{ margin: 10px auto; } /** CUSTOM CODE **/ --></style> <style id='template-skin-1' type='text/css'><!-- .header-outer { clear: both; } .header-inner { margin: auto; padding: 0px; } .footer-outer { background: #f5f5f5; clear: both; margin: 0; } .footer-inner { margin: auto; padding: 0px; } .footer-inner-2 { /* Account for right hand column elasticity. */ max-width: calc(100% - 248px); } .google-footer-outer { clear: both; } .cols-wrapper, .google-footer-outer, .footer-inner, .header-inner { max-width: 978px; margin-left: auto; margin-right: auto; } .cols-wrapper { margin: auto; clear: both; margin-top: 60px; margin-bottom: 60px; overflow: hidden; } .col-main-wrapper { float: left; width: 100%; } .col-main { margin-right: 278px; max-width: 660px; } .col-right { float: right; width: 248px; margin-left: -278px; } /* Tweaks for layout mode. */ body#layout .google-footer-outer { display: none; } body#layout .header-outer, body#layout .footer-outer { background: none; } body#layout .header-inner { height: initial; } body#layout .cols-wrapper { margin-top: initial; margin-bottom: initial; } --></style> <!-- start all head --> <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/> <meta content='blogger' name='generator'/> <link href='https://cloud.googleblog.com/favicon.ico' rel='icon' type='image/x-icon'/> <link href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='canonical'/> <link rel="alternate" type="application/atom+xml" title="Official Google Cloud Blog - Atom" href="https://cloud.googleblog.com/feeds/posts/default" /> <link rel="alternate" type="application/rss+xml" title="Official Google Cloud Blog - RSS" href="https://cloud.googleblog.com/feeds/posts/default?alt=rss" /> <link rel="service.post" type="application/atom+xml" title="Official Google Cloud Blog - Atom" href="https://www.blogger.com/feeds/6567687196385815607/posts/default" /> <!--Can't find substitution for tag [blog.ieCssRetrofitLinks]--> <meta content='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' property='og:url'/> <meta content='Official Google Cloud Blog' property='og:title'/> <meta content='Built in the cloud. Engineered for your enterprise.' property='og:description'/> <!-- end all head --> <base target='_self'/> <style> html { font-family: Roboto, sans-serif; -moz-osx-font-smoothing: grayscale; -webkit-font-smoothing: antialiased; } body { padding: 0; /* This ensures that the scroll bar is always present, which is needed */ /* because content render happens after page load; otherwise the header */ /* would "bounce" in-between states. */ min-height: 150%; } h2 { font-size: 16px; } h1, h2, h3, h4, h5 { line-height: 2em; } html, h4, h5, h6 { font-size: 14px; } a, a:visited { color: #4184F3; text-decoration: none; } a:focus, a:hover, a:active { text-decoration: none; } .Header { margin-top: 15px; } .Header h1 { font-size: 32px; font-weight: 300; line-height: 32px; height: 42px; } .header-inner .Header .titlewrapper { padding: 0; margin-top: 30px; } .header-inner .Header .descriptionwrapper { padding: 0; margin: 0; } .cols-wrapper { margin-top: 56px; } .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 60px; } .header-inner { height: 256px; position: relative; } html, .header-inner a { color: #212121; color: rgba(0,0,0,.87); } .header-inner .google-logo { display: inline-block; background-size: contain; z-index: 1; height: 50px; overflow: hidden; margin-top: 4px; } .header-left { position: absolute; top: 50%; -webkit-transform: translateY(-50%); transform: translateY(-50%); margin-top: 12px; width: 100%; } .google-logo { margin-left: -4px; } #google-footer { position: relative; font-size: 13px; list-style: none; text-align: right; } #google-footer a { color: #444; } #google-footer ul { margin: 0; padding: 0; height: 144px; line-height: 144px; } #google-footer ul li { display: inline; } #google-footer ul li:before { color: #999; content: "\00b7"; font-weight: bold; margin: 5px; } #google-footer ul li:first-child:before { content: ''; } #google-footer .google-logo-dark { left: 0; margin-top: -16px; position: absolute; top: 50%; } /** Sitemap links. **/ .footer-inner-2 { font-size: 14px; padding-top: 42px; padding-bottom: 74px; } .footer-inner-2 .HTML h2 { color: #212121; color: rgba(0,0,0,.87); font-size: 14px; font-weight: 500; padding-left: 0; margin: 10px 0; } .footer-inner-2 .HTML ul { font-weight: normal; list-style: none; padding-left: 0; } .footer-inner-2 .HTML li { line-height: 24px; padding: 0; } .footer-inner-2 li a { color: rgba(65,132,243,.87); } /** Archive widget. **/ .BlogArchive { font-size: 13px; font-weight: normal; } .BlogArchive .widget-content { display: none; } .BlogArchive h2, .Label h2 { color: #4184F3; text-decoration: none; } .BlogArchive .hierarchy li { display: inline-block; } /* Specificity needed here to override widget CSS defaults. */ .BlogArchive #ArchiveList ul li, .BlogArchive #ArchiveList ul ul li { margin: 0; padding-left: 0; text-indent: 0; } .BlogArchive .intervalToggle { cursor: pointer; } .BlogArchive .expanded .intervalToggle .new-toggle { -ms-transform: rotate(180deg); transform: rotate(180deg); } .BlogArchive .new-toggle { float: right; padding-top: 3px; opacity: 0.87; } #ArchiveList { text-transform: uppercase; } #ArchiveList .expanded > ul:last-child { margin-bottom: 16px; } #ArchiveList .archivedate { width: 100%; } /* Months */ .BlogArchive .items { max-width: 150px; margin-left: -4px; } .BlogArchive .expanded .items { margin-bottom: 10px; overflow: hidden; } .BlogArchive .items > ul { float: left; height: 32px; } .BlogArchive .items a { padding: 0 4px; } .Label { font-size: 13px; font-weight: normal; } .sidebar-icon { display: inline-block; width: 24px; height: 24px; vertical-align: middle; margin-right: 12px; margin-top: -1px } .Label a { margin-right: 4px; } .Label .widget-content { display: none; } .FollowByEmail { font-size: 13px; font-weight: normal; } .FollowByEmail h2 { background: url("data:image/png;base64,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"); background-repeat: no-repeat; background-position: 0 50%; text-indent: 30px; } .FollowByEmail .widget-content { display: none; } .searchBox input { border: 1px solid #eee; color: #212121; color: rgba(0,0,0,.87); font-size: 14px; padding: 8px 8px 8px 40px; width: 164px; font-family: Roboto, sans-serif; background: url("https://www.gstatic.com/images/icons/material/system/1x/search_grey600_24dp.png") 8px center no-repeat; } .searchBox ::-webkit-input-placeholder { /* WebKit, Blink, Edge */ color: rgba(0,0,0,.54); } .searchBox :-moz-placeholder { /* Mozilla Firefox 4 to 18 */ color: #000; opacity: 0.54; } .searchBox ::-moz-placeholder { /* Mozilla Firefox 19+ */ color: #000; opacity: 0.54; } .searchBox :-ms-input-placeholder { /* Internet Explorer 10-11 */ color: #757575; } .widget-item-control { margin-top: 0px; } .section { margin: 0; padding: 0; } #sidebar-top { border: 1px solid #eee; } #sidebar-top > div { margin: 16px 0; } .widget ul { line-height: 1.6; } /*main post*/ .post { margin-bottom:30px; } #main .post .title { margin: 0; } #main .post .title a { color: #212121; color: rgba(0,0,0,.87); font-weight: normal; font-size: 24px; } #main .post .title a:hover { text-decoration:none; color:#4184F3; } .message, #main .post .post-header { margin: 0; padding: 0; } #main .post .post-header .caption, #main .post .post-header .labels-caption, #main .post .post-footer .caption, #main .post .post-footer .labels-caption { color: #444; font-weight: 500; } #main .tr-caption-container td { text-align: left; } #main .post .tr-caption { color: #757575; color: rgba(0,0,0,.54); display: block; max-width: 560px; padding-bottom: 20px; } #main .post .tr-caption-container { line-height: 24px; margin: -1px 0 0 0 !important; padding: 4px 0; text-align: left; } #main .post .post-header .published{ font-size:11px; font-weight:bold; } .post-header .publishdate { font-size: 17px; font-weight:normal; color: #757575; color: rgba(0,0,0,.54); } #main .post .post-footer{ font-size:12px; padding-bottom: 21px; } .label-footer { margin-bottom: 12px; margin-top: 12px; } .comment-img { margin-right: 16px; opacity: 0.54; vertical-align: middle; } #main .post .post-header .published { margin-bottom: 40px; margin-top: -2px; } .post .post-content { color: #212121; color: rgba(0,0,0,.87); font-size: 17px; margin: 25px 0 36px 0; line-height: 32px; } .post-body .post-content ul, .post-body .post-content ol { margin: 16px 0; padding: 0 48px; } .post-summary { display: none; } /* Another old-style caption. */ .post-content div i, .post-content div + i { font-size: 14px; font-style: normal; color: #757575; color: rgba(0,0,0,.54); display: block; line-height: 24px; margin-bottom: 16px; text-align: left; } /* Another old-style caption (with link) */ .post-content a > i { color: #4184F3 !important; } /* Old-style captions for images. */ .post-content .separator + div:not(.separator) { margin-top: -16px; } /* Capture section headers. */ .post-content br + br + b, .post-content .space + .space + b, .post-content .separator + b { display: inline-block; margin-bottom: 8px; margin-top: 24px; } .post-content li { line-height: 32px; } /* Override all post images/videos to left align. */ .post-content .separator, .post-content > div { text-align: left; } .post-content .separator > a, .post-content .separator > span { margin-left: 0 !important; } .post-content img { max-width: 100%; height: auto; width: auto; } .post-content .tr-caption-container img { margin-bottom: 12px; } .post-content iframe, .post-content embed { max-width: 100%; } .post-content .carousel-container { margin-bottom: 48px; } #main .post-content b { font-weight: 500; } /* These are the main paragraph spacing tweaks. */ #main .post-content br { content: ' '; display: block; padding: 4px; } .post-content .space { display: block; height: 8px; } .post-content iframe + .space, .post-content iframe + br { padding: 0 !important; } #main .post .jump-link { margin-bottom:10px; } .post-content img, .post-content iframe { margin: 30px 0 20px 0; } .post-content > img:first-child, .post-content > iframe:first-child { margin-top: 0; } .col-right .section { padding: 0 16px; } #aside { background:#fff; border:1px solid #eee; border-top: 0; } #aside .widget { margin:0; } #aside .widget h2, #ArchiveList .toggle + a.post-count-link { color: #212121; color: rgba(0,0,0,.87); font-weight: 400 !important; margin: 0; } #ArchiveList .toggle { float: right; } #ArchiveList .toggle .material-icons { padding-top: 4px; } #sidebar .tab { cursor: pointer; } #sidebar .tab .arrow { display: inline-block; float: right; } #sidebar .tab .icon { display: inline-block; vertical-align: top; height: 24px; width: 24px; margin-right: 13px; margin-left: -1px; margin-top: 1px; color: #757575; color: rgba(0,0,0,.54); } #sidebar .widget-content > :first-child { padding-top: 8px; } #sidebar .active .tab .arrow { -ms-transform: rotate(180deg); transform: rotate(180deg); } #sidebar .arrow { color: #757575; color: rgba(0,0,0,.54); } #sidebar .widget h2 { font-size: 14px; line-height: 24px; display: inline-block; } #sidebar .widget .BlogArchive { padding-bottom: 8px; } #sidebar .widget { border-bottom: 1px solid #eee; box-shadow: 0px 1px 0 white; margin-bottom: 0; padding: 14px 0; min-height: 20px; } #sidebar .widget:last-child { border-bottom: none; box-shadow: none; margin-bottom: 0; } #sidebar ul { margin: 0; padding: 0; } #sidebar ul li { list-style:none; padding:0; } #sidebar ul li a { line-height: 32px; } #sidebar .archive { background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAYCAYAAADzoH0MAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAE1JREFUeNpiNDY23s9AAWBioBCwYBM8c+YMVsUmJibEGYBNMS5DaeMFfDYSZQA2v9I3FrB5AZeriI4FmnrBccCT8mhmGs1MwyAzAQQYAKEWG9zm9QFEAAAAAElFTkSuQmCC"); height: 24px; line-height: 24px; padding-left: 30px; } #sidebar .labels { background-image: url("data:image/png;base64,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"); height: 20px; line-height: 20px; padding-left: 30px; } #sidebar .rss a { background-image: url("data:image/png;base64,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"); } #sidebar .subscription a { background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABEAAAALCAYAAACZIGYHAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAUBJREFUeNrMkSGLAlEUhb+ZB4JFi8mx2cz+ApvhRUGTcUCrNqNJDYIi+DO0GUwmQXDK2DSIoGgZcSaIjDrzwrK4ssvChj1w0733O+fdp+m6PozH4yQSCfb7Pa7r8pOi0SjJZBLP8zgej4gAIMvlMuPxmADIYrHger1+C6lUKmo+NJ/NZojb7SZDWiwWo1qtks1msW2bw+HwZdkwDHq9HvV6nel0SqvVYrvdIh6Ph3Qch+VyqRYLhQJSSjRNw7IsfN9XgGKxSLfbJZfL0e/3aTabrFYr7vc7IujLcOh8PqunrNdr0uk0pVKJVCpFJBJRgEajweVyod1uMxgM2O12BAGUgRbU8DV2JpOhVquRz+cRQii3+XxOp9NRN3jVR5LPOp1OjEYjlSL8hclkgmmabDabt4d+m+S30vkD/R/IU4ABAPTZgnZdmG/PAAAAAElFTkSuQmCC"); } #sidebar-bottom { background: #f5f5f5; border-top:1px solid #eee; } #sidebar-bottom .widget { border-bottom: 1px solid #e0e0e0; padding: 15px 0; text-align: center; } #sidebar-bottom > div:last-child { border-bottom: 0; } #sidebar-bottom .text { line-height: 20px; } /* Home, forward, and backward pagination. */ .blog-pager { border-top : 1px #e0e0e0 solid; padding-top: 10px; margin-top: 15px; text-align: right !important; } #blog-pager { margin-botom: 0; margin-top: -14px; padding: 16px 0 0 0; } #blog-pager a { display: inline-block; } .blog-pager i.disabled { opacity: 0.2 !important; } .blog-pager i { color: black; margin-left: 16px; opacity: 0.54; } .blog-pager i:hover, .blog-pager i:active { opacity: 0.87; } #blog-pager-older-link, #blog-pager-newer-link { float: none; } .gplus-profile { background-color: #fafafa; border: 1px solid #eee; overflow: hidden; width: 212px; } .gplus-profile-inner { margin-left: -1px; margin-top: -1px; } /* Sidebar follow buttons. */ .followgooglewrapper { padding: 12px 0 0 0; } .loading { visibility: hidden; } .detail-page .post-footer .cmt_iframe_holder { padding-top: 40px !important; } /** Desktop **/ @media (max-width: 900px) { .col-right { display: none; } .col-main { margin-right: 0; min-width: initial; } .footer-outer { display: none; } .cols-wrapper { min-width: initial; } .google-footer-outer { background-color: #f5f5f5; } } /** Tablet **/ @media (max-width: 712px) { .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 40px; } } /* An extra breakpoint accommodating for long blog titles. */ @media (max-width: 600px) { .header-left { height: 100%; top: inherit; margin-top: 0; -webkit-transform: initial; transform: initial; } .header-title { margin-top: 18px; } .header-inner .google-logo { height: 40px; margin-top: 3px; } .header-inner .google-logo img { height: 35px; } .header-title h2 { font-size: 32px; line-height: 36px; } .header-desc { bottom: 24px; position: absolute; } } /** Mobile/small desktop window; also landscape. **/ @media (max-width: 480px), (max-height: 480px) { .header-outer, .cols-wrapper, .footer-outer, .google-footer-outer { padding: 0 16px; } .cols-wrapper { margin-top: 0; } .post-header .publishdate, .post .post-content { font-size: 16px; } .post .post-content { line-height: 28px; margin-bottom: 30px; } .post { margin-top: 30px; } .byline-author { display: block; font-size: 12px; line-height: 24px; margin-top: 6px; } #main .post .title a { font-weight: 500; color: #4c4c4c; color: rgba(0,0,0,.70); } #main .post .post-header { padding-bottom: 12px; } #main .post .post-header .published { margin-bottom: -8px; margin-top: 3px; } .post .read-more { display: block; margin-top: 14px; } .post .tr-caption { font-size: 12px; } #main .post .title a { font-size: 20px; line-height: 30px; } .post-content iframe { /* iframe won't keep aspect ratio when scaled down. */ max-height: 240px; } .post-content .separator img, .post-content .tr-caption-container img, .post-content iframe { margin-left: -16px; max-width: inherit; width: calc(100% + 32px); } .post-content table, .post-content td { width: 100%; } #blog-pager { margin: 0; padding: 16px 0; } /** List page tweaks. **/ .list-page .post-original { display: none; } .list-page .post-summary { display: block; } .list-page .comment-container { display: none; } .list-page #blog-pager { padding-top: 0; border: 0; margin-top: -8px; } .list-page .label-footer { display: none; } .list-page #main .post .post-footer { border-bottom: 1px solid #eee; margin: -16px 0 0 0; padding: 0 0 20px 0; } .list-page .post .share { display: none; } /** Detail page tweaks. **/ .detail-page .post-footer .cmt_iframe_holder { padding-top: 32px !important; } .detail-page .label-footer { margin-bottom: 0; } .detail-page #main .post .post-footer { padding-bottom: 0; } .detail-page #comments { display: none; } } [data-about-pullquote], [data-is-preview], [data-about-syndication] { display: none; } </style> <noscript> <style> .loading { visibility: visible }</style> </noscript> <script type='text/javascript'> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-18038-3', 'auto', 'blogger'); ga('blogger.send', 'pageview'); </script> <link href='https://www.blogger.com/dyn-css/authorization.css?targetBlogID=6567687196385815607&amp;zx=e76fb540-b24b-49b0-9255-53fe5dfedfeb' media='none' onload='if(media!=&#39;all&#39;)media=&#39;all&#39;' rel='stylesheet'/><noscript><link href='https://www.blogger.com/dyn-css/authorization.css?targetBlogID=6567687196385815607&amp;zx=e76fb540-b24b-49b0-9255-53fe5dfedfeb' rel='stylesheet'/></noscript> <meta name='google-adsense-platform-account' content='ca-host-pub-1556223355139109'/> <meta name='google-adsense-platform-domain' content='blogspot.com'/> </head> <body> <script type='text/javascript'> //<![CDATA[ var axel = Math.random() + ""; var a = axel * 10000000000000; document.write('<iframe src="https://2542116.fls.doubleclick.net/activityi;src=2542116;type=gblog;cat=googl0;ord=ord=' + a + '?" width="1" height="1" frameborder="0" style="display:none"></iframe>'); //]]> </script> <noscript> <img alt='' height='1' src='https://ad.doubleclick.net/ddm/activity/src=2542116;type=gblog;cat=googl0;ord=1?' width='1'/> </noscript> <!-- Header --> <div class='header-outer'> <div class='header-inner'> <div class='section' id='header'><div class='widget Header' data-version='1' id='Header1'> <div class='header-left'> <div class='header-title'> <a class='google-logo' href='https://cloud.googleblog.com/'> <img height="50" src="//3.bp.blogspot.com/-a3v4BOp6LoU/V-y9lFzsb_I/AAAAAAAATGY/aD_EUNu9X4MHVu3ScQH38S2yvyNAVON9ACK4B/s1600/logo_lockup_cloud_color.png"> </a> <a href='/.'> <h2> Official Blog </h2> </a> </div> <div class='header-desc'> Built in the cloud. Engineered for your enterprise. </div> </div> </div></div> </div> </div> <!-- all content wrapper start --> <div class='cols-wrapper loading'> <div class='col-main-wrapper'> <div class='col-main'> <div class='section' id='main'><div class='widget Blog' data-version='1' id='Blog1'> <div class='post' data-id='3586454288341264311' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html' itemprop='url' title='Q3’10 spam &amp; virus trends from Postini'> Q3&#8217;10 spam &amp; virus trends from Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Monday, October 18, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style="font-style:italic;">Editor's note: The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, that process more than 3 billion email messages per day. More than 50,000 businesses and 22 million users use Google Postini Services to protect themselves from a range of email and web-borne threats.</span><br /><br />Q3&#8217;10 spam and virus trends confirm that spammers are still hard at work distributing malicious content in new and creative ways. August saw a massive 241% increase in virus volume over July, representing the greatest recorded surge in viral activity since 2008. Overall, payload virus volume increased 42% over Q2&#8217;10 and 10% over Q3&#8217;09, while spam levels decreased 16% and 24% over the same periods, respectively. The spike in malware attacks during August suggests that we might see higher levels of spam moving forward into Q4 as botnet &#8220;seeds&#8221; planted during this time begin to take action.<br /><br /><span style="font-weight:bold;">By the numbers</span><br />Overall, spam volume stayed relatively constant throughout Q3, with a slight dip in August and September. In comparison to the same time in 2009, spam levels are down 24%. This may be attributed to some recent botnet takedowns, such as the partial Pushdo shut down, or point to a generally slower summer season for spam.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//2.bp.blogspot.com/_2ib5z2dvVco/TLxzd4UYQTI/AAAAAAAAABg/BSehE3nNvaA/s1600/Q3%2710+Spam+per+user.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529421399675388210" src="//2.bp.blogspot.com/_2ib5z2dvVco/TLxzd4UYQTI/AAAAAAAAABg/BSehE3nNvaA/s400/Q3%2710+Spam+per+user.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 243px;"></a><br />However, payload virus levels shot up to record-high levels in August. In comparison to August of 2009, we saw a 111% percent increase in volume overall. What is more remarkable, though, is that this August saw the highest registered number of viruses blocked in a single day: 188 million. This virus surge is even more pronounced than last October&#8217;s, when Mega-D, a top-ten botnet, infected over 250,000 computers worldwide before being shut down by a carefully orchestrated campaign by security professionals. This recent increase in viral activity could indicate a &#8220;gearing up&#8221; as spammers attempt to construct botnets in time for the holiday season and increased consumer spending. With the commercialization of spam in 2006, we&#8217;ve often seen a correlation between spam, malware campaigns, and seasonal consumer patterns.<br /><br />The actual content of this virus wave consisted mainly of traditional spoofing of major brands, along with a new tactic involving recycling previously sent emails taken from the hard drives of infected computers. This new method is more difficult to detect as the wording and content is familiar to the recipient. As always, be on the lookout for suspicious email language and exercise extreme caution when clicking on links. Features in Gmail such as <a href="http://gmailblog.blogspot.com/2009/07/new-in-labs-super-trustworthy-anti.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-Q3SpamTrends_10142010&amp;utm_medium=blog">authentication icons</a> can go a long way in protecting your computer, but it&#8217;s important to be aware and mindful of these new viral activities when managing your inbox.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//2.bp.blogspot.com/_2ib5z2dvVco/TLxxoPrPmmI/AAAAAAAAABI/kaiLo2lMYQM/s1600/Q3%2710+virus+payload.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529419378720741986" src="//2.bp.blogspot.com/_2ib5z2dvVco/TLxxoPrPmmI/AAAAAAAAABI/kaiLo2lMYQM/s400/Q3%2710+virus+payload.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 241px;"></a><br />An interesting and unusual trend has been in the sizes of the individual viruses being transmitted. Particularly, we&#8217;ve seen some irregularly sharp peaks in size throughout September, following the surge in total numbers during August. This could be due in part to increased use of .zip and .html attachments containing malicious JavaScripts. Overall, virus traffic continues to be strong and users need to be on high alert when handling suspicious messages. Postini Services customers are strongly encouraged to enable the Early Detection Filtering functionality in order to ensure maximum protection from zero day virus threats.</div><div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_2ib5z2dvVco/TLxyoptILhI/AAAAAAAAABQ/T-VqFjLppxc/s1600/Q3%2710+virus+size.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529420485219593746" src="//1.bp.blogspot.com/_2ib5z2dvVco/TLxyoptILhI/AAAAAAAAABQ/T-VqFjLppxc/s400/Q3%2710+virus+size.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 222px;"></a><br /><span style="font-weight:bold;">Shortened URLs can mask suspicious links</span><br />This quarter we detected an increased volume of emails containing shortened URLs linking to suspicious websites. Spammers are increasingly making use of services that shorten URLs as a way of masking the destination website to the user. With the widespread proliferation of shortened URLs, particularly among blogging sites and social networks, it has become increasingly important to remain vigilant and skeptical when evaluating URLs. A shortened URL sent from a &#8220;friend&#8221; might seem innocuous enough, but, as always, links and emails sent from unknown senders should be scrutinized before further action is taken.<br /><br /><span style="font-weight:bold;">Beware false financial transaction messages</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_2ib5z2dvVco/TLySxbhtAbI/AAAAAAAAABw/veFOep7_TP4/s1600/Q3%2710+ACH.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529455820404490674" src="//1.bp.blogspot.com/_2ib5z2dvVco/TLySxbhtAbI/AAAAAAAAABw/veFOep7_TP4/s400/Q3%2710+ACH.png" style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 175px;"></a><br />We continue to see false notifications claiming to be sent by various financial authorities. Spammers will frequently send their targets a simple yet authoritative message alerting them of a rejected or unauthorized transaction, then provide a false link directing them to a website. The format of these emails is often simple and innocuous, making it difficult to ascertain the malicious content from a quick glance.<div><br /><span style="font-weight:bold;">Continued use of NDRs</span><br />Non-Delivery Report/Receipt (NDR) are legitimate messages used to alert users that a sent email has not been delivered correctly. <a href="http://googleenterprise.blogspot.com/2010/07/q210-spam-virus-trends-from-postini.html">Back in July</a> we noticed an upswing in false NDRs bearing malicious JavaScript. As a hybrid between virus and spam messages, these messages were in reality obfuscated JavaScript attacks, directing users to a particular website or initiating an unexpected download. The user is often unaware of the attacks, making these messages particularly dangerous and difficult to detect. However, Google&#8217;s vast network and patented filtering technology was able to detect these messages early on and respond quickly. The Postini-Anti-Spam-Engine (PASE) was immediately updated in response and has been protecting users throughout Q3 from the continued use of false NDRs.<div><br /><span style="font-weight:bold;">Fake celebrity gossip</span><br />Although August was a slower month in terms of overall spam volume, we saw a substantial spike in messages claiming to break the news of untimely and sudden deaths of various high-profile celebrities. The messages referenced a zip file that in turn contained a virus. These messages, similar to various classic phishing scams involving &#8220;friends&#8221; in need, attempt to pique a user&#8217;s interest with an alarming subject line and content. This has proven to be a successful tactic &#8211; hence its continued popularity &#8211; as users will often open an email instinctively in response to a particularly emotional or compelling subject line. In response to these attacks, our engineers have developed and released filters designed to combat new spam waves.</div><div><br /><span style="font-weight:bold;">Stay safe with a cloud-based security solution</span><br />Postini&#8217;s hosted <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-Q3SpamTrends_10142010&amp;utm_medium=blog">email security solutions</a> provide comprehensive spam and virus filtering in the cloud &#8211; before they reach the network level. Google&#8217;s vast network filters billions of messages a day from all over the globe, creating a &#8220;network effect&#8221; that allows Google to identify emerging threats and respond early.<br /><br />For more information on how Google Postini Services can help your organization remain safe, compliant, and spam-free, please visit <a href="//www.google.com/postini#utm_campaign=en&amp;utm_source=en-na-us-entblog-Q3SpamTrends_10142010&amp;utm_medium=blog">www.google.com/postini</a>.</div><div><br /><span class="byline-author">Posted by Adrian Soghoian and Adam Hollman, Google Postini Services Team</span></div></div></div></div> </script> <noscript> <span style="font-style:italic;">Editor's note: The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, that process more than 3 billion email messages per day. More than 50,000 businesses and 22 million users use Google Postini Services to protect themselves from a range of email and web-borne threats.</span><br /><br />Q3&#8217;10 spam and virus trends confirm that spammers are still hard at work distributing malicious content in new and creative ways. August saw a massive 241% increase in virus volume over July, representing the greatest recorded surge in viral activity since 2008. Overall, payload virus volume increased 42% over Q2&#8217;10 and 10% over Q3&#8217;09, while spam levels decreased 16% and 24% over the same periods, respectively. The spike in malware attacks during August suggests that we might see higher levels of spam moving forward into Q4 as botnet &#8220;seeds&#8221; planted during this time begin to take action.<br /><br /><span style="font-weight:bold;">By the numbers</span><br />Overall, spam volume stayed relatively constant throughout Q3, with a slight dip in August and September. In comparison to the same time in 2009, spam levels are down 24%. This may be attributed to some recent botnet takedowns, such as the partial Pushdo shut down, or point to a generally slower summer season for spam.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//2.bp.blogspot.com/_2ib5z2dvVco/TLxzd4UYQTI/AAAAAAAAABg/BSehE3nNvaA/s1600/Q3%2710+Spam+per+user.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529421399675388210" src="//2.bp.blogspot.com/_2ib5z2dvVco/TLxzd4UYQTI/AAAAAAAAABg/BSehE3nNvaA/s400/Q3%2710+Spam+per+user.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 243px;"></a><br />However, payload virus levels shot up to record-high levels in August. In comparison to August of 2009, we saw a 111% percent increase in volume overall. What is more remarkable, though, is that this August saw the highest registered number of viruses blocked in a single day: 188 million. This virus surge is even more pronounced than last October&#8217;s, when Mega-D, a top-ten botnet, infected over 250,000 computers worldwide before being shut down by a carefully orchestrated campaign by security professionals. This recent increase in viral activity could indicate a &#8220;gearing up&#8221; as spammers attempt to construct botnets in time for the holiday season and increased consumer spending. With the commercialization of spam in 2006, we&#8217;ve often seen a correlation between spam, malware campaigns, and seasonal consumer patterns.<br /><br />The actual content of this virus wave consisted mainly of traditional spoofing of major brands, along with a new tactic involving recycling previously sent emails taken from the hard drives of infected computers. This new method is more difficult to detect as the wording and content is familiar to the recipient. As always, be on the lookout for suspicious email language and exercise extreme caution when clicking on links. Features in Gmail such as <a href="http://gmailblog.blogspot.com/2009/07/new-in-labs-super-trustworthy-anti.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-Q3SpamTrends_10142010&amp;utm_medium=blog">authentication icons</a> can go a long way in protecting your computer, but it&#8217;s important to be aware and mindful of these new viral activities when managing your inbox.<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//2.bp.blogspot.com/_2ib5z2dvVco/TLxxoPrPmmI/AAAAAAAAABI/kaiLo2lMYQM/s1600/Q3%2710+virus+payload.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529419378720741986" src="//2.bp.blogspot.com/_2ib5z2dvVco/TLxxoPrPmmI/AAAAAAAAABI/kaiLo2lMYQM/s400/Q3%2710+virus+payload.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 241px;"></a><br />An interesting and unusual trend has been in the sizes of the individual viruses being transmitted. Particularly, we&#8217;ve seen some irregularly sharp peaks in size throughout September, following the surge in total numbers during August. This could be due in part to increased use of .zip and .html attachments containing malicious JavaScripts. Overall, virus traffic continues to be strong and users need to be on high alert when handling suspicious messages. Postini Services customers are strongly encouraged to enable the Early Detection Filtering functionality in order to ensure maximum protection from zero day virus threats.</div><div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_2ib5z2dvVco/TLxyoptILhI/AAAAAAAAABQ/T-VqFjLppxc/s1600/Q3%2710+virus+size.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529420485219593746" src="//1.bp.blogspot.com/_2ib5z2dvVco/TLxyoptILhI/AAAAAAAAABQ/T-VqFjLppxc/s400/Q3%2710+virus+size.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 222px;"></a><br /><span style="font-weight:bold;">Shortened URLs can mask suspicious links</span><br />This quarter we detected an increased volume of emails containing shortened URLs linking to suspicious websites. Spammers are increasingly making use of services that shorten URLs as a way of masking the destination website to the user. With the widespread proliferation of shortened URLs, particularly among blogging sites and social networks, it has become increasingly important to remain vigilant and skeptical when evaluating URLs. A shortened URL sent from a &#8220;friend&#8221; might seem innocuous enough, but, as always, links and emails sent from unknown senders should be scrutinized before further action is taken.<br /><br /><span style="font-weight:bold;">Beware false financial transaction messages</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_2ib5z2dvVco/TLySxbhtAbI/AAAAAAAAABw/veFOep7_TP4/s1600/Q3%2710+ACH.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5529455820404490674" src="//1.bp.blogspot.com/_2ib5z2dvVco/TLySxbhtAbI/AAAAAAAAABw/veFOep7_TP4/s400/Q3%2710+ACH.png" style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 175px;"></a><br />We continue to see false notifications claiming to be sent by various financial authorities. Spammers will frequently send their targets a simple yet authoritative message alerting them of a rejected or unauthorized transaction, then provide a false link directing them to a website. The format of these emails is often simple and innocuous, making it difficult to ascertain the malicious content from a quick glance.<div><br /><span style="font-weight:bold;">Continued use of NDRs</span><br />Non-Delivery Report/Receipt (NDR) are legitimate messages used to alert users that a sent email has not been delivered correctly. <a href="http://googleenterprise.blogspot.com/2010/07/q210-spam-virus-trends-from-postini.html">Back in July</a> we noticed an upswing in false NDRs bearing malicious JavaScript. As a hybrid between virus and spam messages, these messages were in reality obfuscated JavaScript attacks, directing users to a particular website or initiating an unexpected download. The user is often unaware of the attacks, making these messages particularly dangerous and difficult to detect. However, Google&#8217;s vast network and patented filtering technology was able to detect these messages early on and respond quickly. The Postini-Anti-Spam-Engine (PASE) was immediately updated in response and has been protecting users throughout Q3 from the continued use of false NDRs.<div><br /><span style="font-weight:bold;">Fake celebrity gossip</span><br />Although August was a slower month in terms of overall spam volume, we saw a substantial spike in messages claiming to break the news of untimely and sudden deaths of various high-profile celebrities. The messages referenced a zip file that in turn contained a virus. These messages, similar to various classic phishing scams involving &#8220;friends&#8221; in need, attempt to pique a user&#8217;s interest with an alarming subject line and content. This has proven to be a successful tactic &#8211; hence its continued popularity &#8211; as users will often open an email instinctively in response to a particularly emotional or compelling subject line. In response to these attacks, our engineers have developed and released filters designed to combat new spam waves.</div><div><br /><span style="font-weight:bold;">Stay safe with a cloud-based security solution</span><br />Postini&#8217;s hosted <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-Q3SpamTrends_10142010&amp;utm_medium=blog">email security solutions</a> provide comprehensive spam and virus filtering in the cloud &#8211; before they reach the network level. Google&#8217;s vast network filters billions of messages a day from all over the globe, creating a &#8220;network effect&#8221; that allows Google to identify emerging threats and respond early.<br /><br />For more information on how Google Postini Services can help your organization remain safe, compliant, and spam-free, please visit <a href="//www.google.com/postini#utm_campaign=en&amp;utm_source=en-na-us-entblog-Q3SpamTrends_10142010&amp;utm_medium=blog">www.google.com/postini</a>.</div><div><br /><span class="byline-author">Posted by Adrian Soghoian and Adam Hollman, Google Postini Services Team</span></div></div></div></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q3’10 spam &amp; virus trends from Postini&url=https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html' data-url='https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/10/q310-spam-virus-trends-from-postini.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='4980045810133756632' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html' itemprop='url' title='Join us! Live Google Postini webinar featuring Enterprise Holdings on 9/28'> Join us! Live Google Postini webinar featuring Enterprise Holdings on 9/28 </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, September 22, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> Enterprise Holdings is the largest rental car company in North America and operates Alamo Rent A Car, Enterprise Rent-A-Car and National Car Rental. They manage over 1.1 million cars, 68,000 employees and 7,600 locations around the world. When Enterprise Holdings wanted to add more security to their corporate e-mail, they chose <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-postiniwebinar_09222010&amp;utm_medium=blog">Google Postini Services</a>. <br /><br />Join us for a <a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">free webinar</a> on September 28, where Michael Preuss, Manager of Windows Engineering for Enterprise Holdings, will discuss why his company chose a cloud-based message security solution and how Postini&#8217;s powerful spam filtering technology was able to help them address their email security challenges. Adam Swidler, Senior Manager with Google Enterprise, will also provide an overview of Google&#8217;s security solutions and facilitate a deep-dive discussion into best-in-class practices for organizations interested in enterprise-grade protection. <br /><br />A live Q & A session will follow. We hope you can join us! <br /><br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Message Security in the Cloud</a><br />Tuesday, September 28th, 2010<br />10 a.m. PDT / 1 p.m. EDT / 6 p.m. GMT<br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Register here</a><br /><br />Posted by Adrian Soghoian, Google Postini Services team </script> <noscript> Enterprise Holdings is the largest rental car company in North America and operates Alamo Rent A Car, Enterprise Rent-A-Car and National Car Rental. They manage over 1.1 million cars, 68,000 employees and 7,600 locations around the world. When Enterprise Holdings wanted to add more security to their corporate e-mail, they chose <a href="//www.google.com/postini/email.html#utm_campaign=en&amp;utm_source=en-na-us-entblog-postiniwebinar_09222010&amp;utm_medium=blog">Google Postini Services</a>. <br /><br />Join us for a <a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">free webinar</a> on September 28, where Michael Preuss, Manager of Windows Engineering for Enterprise Holdings, will discuss why his company chose a cloud-based message security solution and how Postini&#8217;s powerful spam filtering technology was able to help them address their email security challenges. Adam Swidler, Senior Manager with Google Enterprise, will also provide an overview of Google&#8217;s security solutions and facilitate a deep-dive discussion into best-in-class practices for organizations interested in enterprise-grade protection. <br /><br />A live Q & A session will follow. We hope you can join us! <br /><br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Message Security in the Cloud</a><br />Tuesday, September 28th, 2010<br />10 a.m. PDT / 1 p.m. EDT / 6 p.m. GMT<br /><a href="https://google.webex.com/google/onstage/g.php?t=a&d=969048389&SourceId=310">Register here</a><br /><br />Posted by Adrian Soghoian, Google Postini Services team </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Join us! Live Google Postini webinar featuring Enterprise Holdings on 9/28&url=https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html' data-url='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/09/join-us-live-google-postini-webinar.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/google%20message%20security' rel='tag'> google message security </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='9022854979677636877' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html' itemprop='url' title='Q2&#39;10 spam &amp; virus trends from Postini'> Q2&#39;10 spam &amp; virus trends from Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Friday, July 16, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="text-align: left;"><span class="Apple-style-span" style="font-style: italic; font-weight: bold; ">Editor's note:<span class="Apple-style-span" style="font-weight: normal; "> The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email messages per day in the course of providing email security to more than 50,000 businesses and 18 million business users.</span></span></div><div><b><i><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Spam and virus volumes this year have continued their upward trend. Q2&#8217;10 has seen a sharp 16% increase in spam volume over Q1&#8217;10. Virus traffic has moderately increased 3% increase this quarter, however Q2&#8217;10 virus was 260% higher than Q2&#8217;09. These trends tell us that the spammers are still extremely active, and their botnets produce high levels of spam and virus traffic.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">By the by numbers</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Spam volume shot up 16% from Q1&#8217;10 to Q2&#8217;10. Overall, however spam levels are down 15% from Q2&#8217;09.</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494537168575171890" src="//2.bp.blogspot.com/_jSdgG4-DeNE/TECEcYoajTI/AAAAAAAAAlg/8kj0jtG_YOU/s400/spamperuser-q2-2.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 272px; "></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Virus volume grew quickly at the beginning of the quarter, shooting up 90% from March to April, but then quickly dropped off. We saw only a modest 3% uptick from Q1&#8217;10 to Q2&#8217;10 at the aggregate level. Compared to Q2&#8217;09, this represents a 260% increase.</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494537849050096178" src="//3.bp.blogspot.com/_jSdgG4-DeNE/TECFD_mR4jI/AAAAAAAAAlw/wqm3cl6MPv4/s400/virusvolume-q2-2.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 272px; "></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">One interesting trend we noticed is size of individual spam messages rising 35% from Q1&#8217;10. This points to the fact that spammers are sending more image-based spam, as well as viruses as attachments.</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494537507493613666" src="//2.bp.blogspot.com/_jSdgG4-DeNE/TECEwHM3kGI/AAAAAAAAAlo/5ov6GU_XSo8/s400/spamsize-q2-2.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 272px; "></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">New methods of attack</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">We have also seen a recent surge in obfuscated (hidden) JavaScript attacks. These messages are a hybrid between virus and spam messages. The messages are designed to look like Non Delivery Report (NDR) messages, which are legitimate messages, however they contained hidden JavaScript which in some cases tried to do things the user may not have been aware of. </span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">In some cases, the message may have forwarded the user's browser to a pharma site or tried to download something unexpected, which is more virus-like. Since the messages contained classic JavaScript which generates code, the messages could change themselves and take multiple forms, making them challenging to identify. </span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Fortunately, our spam traps were receiving these messages early, providing our engineers with advanced warning which allowed us to write manual filters and escalate to our anti-virus partners quickly. In addition to this, we updated our Postini Anti-Spam Engine (PASE) to recognize the obfuscated JavaScript and capture the messages based on the underlying code to ensure accuracy.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">The classics</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Although they&#8217;ve added a few new tricks to their bag, spammers continue to exploit tried and true techniques, including:</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;">&#8226; False Social Networking Messages</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal; ">Social networks continue to be one of the most frequently spoofed domains for the purpose of spreading phishing scams and virus downloaders. These messages do not actually come from social networks but look similar to legitimate social networks messages. Such messages often contain links to external websites which contain malicious content and/or attempt to harvest user login information. The Postini Anti-Spam Engine is very good at detecting such messages, but users should always be cautious when handling messages from popular social networking sites.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;">&#8226; Current events</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">As always, spammers continue to spoof major news stories, and this quarter, we saw an increase in spam involving the World Cup. Here is one example of a virus downloader that our spam filters caught:</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494538245645565026" src="//3.bp.blogspot.com/_jSdgG4-DeNE/TECFbFCAfGI/AAAAAAAAAl4/Gr7so8tRtB0/s400/World-Cup-Scam-blurred.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 233px; "></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;">&#8226; Shipping scams</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">The shipping scam is a favorite of spammers. This quarter we saw a more wide spread outbreak of messages claiming to be from major shipping companies because spammers get a higher success rate with these type of scams. The subject for the message made it look like an invoice and the message body contained random text such as news stories that did not look particularly "spammy." Each message had an attached zip file that presumably was intended to contain some sort of virus payload; however, the data was corrupt and did not pose any actual threat.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">Stay safe from phishing scams</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">With the global economy continuing to lag, we have seen a continued upswing in <a href="http://www.walletpop.com/blog/2010/07/02/when-a-friend-emails-for-help-beware/">&#8220;friend-in-need&#8221; phishing attempts</a>, where hackers break into the email account of unsuspecting users and then hand-type a message to send to the victim&#8217;s email contacts. </span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">The most common message told a story of the person being mugged while traveling abroad and requesting money to be sent to them in order to help them get home. The hacker is preying on the generosity of the victims friends in the hopes that one or more of them will send money to them. These messages can be difficult for spam filters to identify since they are hand typed and not sent in bulk. It goes without saying, but be wary of emails requesting money &#8211; regardless of the sender.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">In response to these outbreaks, our engineers have released several updated filters to combat new spam waves.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span"><span class="Apple-style-span" style="font-style: normal;">Conclusion</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Spam volume fluctuates in the short term, but overall, for the last 3 quarters spam volume has been relatively flat. Spammers continue to exploit techniques that have proven results, but as we have seen with obfuscated JavaScript attacks spammers are always experimenting with new techniques to stay ahead of security measures. Google Postini Services customers are protected from the brunt of these increases in spam volume.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">For more information on how Google&#8217;s security and archiving services can help your business stay safe and compliant, please visit <a href="//www.google.com/postini">www.google.com/postini</a>.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Posted by Adam Hollman and Gopal Shah, Google Postini Services team</span></span></div><div><br /></div></i></b></div> </script> <noscript> <div style="text-align: left;"><span class="Apple-style-span" style="font-style: italic; font-weight: bold; ">Editor's note:<span class="Apple-style-span" style="font-weight: normal; "> The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email messages per day in the course of providing email security to more than 50,000 businesses and 18 million business users.</span></span></div><div><b><i><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Spam and virus volumes this year have continued their upward trend. Q2&#8217;10 has seen a sharp 16% increase in spam volume over Q1&#8217;10. Virus traffic has moderately increased 3% increase this quarter, however Q2&#8217;10 virus was 260% higher than Q2&#8217;09. These trends tell us that the spammers are still extremely active, and their botnets produce high levels of spam and virus traffic.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">By the by numbers</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Spam volume shot up 16% from Q1&#8217;10 to Q2&#8217;10. Overall, however spam levels are down 15% from Q2&#8217;09.</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494537168575171890" src="//2.bp.blogspot.com/_jSdgG4-DeNE/TECEcYoajTI/AAAAAAAAAlg/8kj0jtG_YOU/s400/spamperuser-q2-2.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 272px; "></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Virus volume grew quickly at the beginning of the quarter, shooting up 90% from March to April, but then quickly dropped off. We saw only a modest 3% uptick from Q1&#8217;10 to Q2&#8217;10 at the aggregate level. Compared to Q2&#8217;09, this represents a 260% increase.</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494537849050096178" src="//3.bp.blogspot.com/_jSdgG4-DeNE/TECFD_mR4jI/AAAAAAAAAlw/wqm3cl6MPv4/s400/virusvolume-q2-2.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 272px; "></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">One interesting trend we noticed is size of individual spam messages rising 35% from Q1&#8217;10. This points to the fact that spammers are sending more image-based spam, as well as viruses as attachments.</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494537507493613666" src="//2.bp.blogspot.com/_jSdgG4-DeNE/TECEwHM3kGI/AAAAAAAAAlo/5ov6GU_XSo8/s400/spamsize-q2-2.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 272px; "></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">New methods of attack</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">We have also seen a recent surge in obfuscated (hidden) JavaScript attacks. These messages are a hybrid between virus and spam messages. The messages are designed to look like Non Delivery Report (NDR) messages, which are legitimate messages, however they contained hidden JavaScript which in some cases tried to do things the user may not have been aware of. </span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">In some cases, the message may have forwarded the user's browser to a pharma site or tried to download something unexpected, which is more virus-like. Since the messages contained classic JavaScript which generates code, the messages could change themselves and take multiple forms, making them challenging to identify. </span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Fortunately, our spam traps were receiving these messages early, providing our engineers with advanced warning which allowed us to write manual filters and escalate to our anti-virus partners quickly. In addition to this, we updated our Postini Anti-Spam Engine (PASE) to recognize the obfuscated JavaScript and capture the messages based on the underlying code to ensure accuracy.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">The classics</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Although they&#8217;ve added a few new tricks to their bag, spammers continue to exploit tried and true techniques, including:</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;">&#8226; False Social Networking Messages</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal; ">Social networks continue to be one of the most frequently spoofed domains for the purpose of spreading phishing scams and virus downloaders. These messages do not actually come from social networks but look similar to legitimate social networks messages. Such messages often contain links to external websites which contain malicious content and/or attempt to harvest user login information. The Postini Anti-Spam Engine is very good at detecting such messages, but users should always be cautious when handling messages from popular social networking sites.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;">&#8226; Current events</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">As always, spammers continue to spoof major news stories, and this quarter, we saw an increase in spam involving the World Cup. Here is one example of a virus downloader that our spam filters caught:</span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><span class="Apple-style-span" style="color: rgb(0, 0, 238); -webkit-text-decorations-in-effect: underline; "><img alt="" border="0" id="BLOGGER_PHOTO_ID_5494538245645565026" src="//3.bp.blogspot.com/_jSdgG4-DeNE/TECFbFCAfGI/AAAAAAAAAl4/Gr7so8tRtB0/s400/World-Cup-Scam-blurred.jpg" style="display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 400px; height: 233px; "></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;">&#8226; Shipping scams</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">The shipping scam is a favorite of spammers. This quarter we saw a more wide spread outbreak of messages claiming to be from major shipping companies because spammers get a higher success rate with these type of scams. The subject for the message made it look like an invoice and the message body contained random text such as news stories that did not look particularly "spammy." Each message had an attached zip file that presumably was intended to contain some sort of virus payload; however, the data was corrupt and did not pose any actual threat.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-style: normal;">Stay safe from phishing scams</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">With the global economy continuing to lag, we have seen a continued upswing in <a href="http://www.walletpop.com/blog/2010/07/02/when-a-friend-emails-for-help-beware/">&#8220;friend-in-need&#8221; phishing attempts</a>, where hackers break into the email account of unsuspecting users and then hand-type a message to send to the victim&#8217;s email contacts. </span></span></div><div><span class="Apple-style-span" style="font-style: normal; font-weight: normal;"><br /></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">The most common message told a story of the person being mugged while traveling abroad and requesting money to be sent to them in order to help them get home. The hacker is preying on the generosity of the victims friends in the hopes that one or more of them will send money to them. These messages can be difficult for spam filters to identify since they are hand typed and not sent in bulk. It goes without saying, but be wary of emails requesting money &#8211; regardless of the sender.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">In response to these outbreaks, our engineers have released several updated filters to combat new spam waves.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span"><span class="Apple-style-span" style="font-style: normal;">Conclusion</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Spam volume fluctuates in the short term, but overall, for the last 3 quarters spam volume has been relatively flat. Spammers continue to exploit techniques that have proven results, but as we have seen with obfuscated JavaScript attacks spammers are always experimenting with new techniques to stay ahead of security measures. Google Postini Services customers are protected from the brunt of these increases in spam volume.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">For more information on how Google&#8217;s security and archiving services can help your business stay safe and compliant, please visit <a href="//www.google.com/postini">www.google.com/postini</a>.</span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><br /></span></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;">Posted by Adam Hollman and Gopal Shah, Google Postini Services team</span></span></div><div><br /></div></i></b></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q2&#39;10 spam &amp; virus trends from Postini&url=https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='5' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html' data-url='https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/07/q2-spam-virus-trends-from-postini.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/news' rel='tag'> news </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='4912415549510437561' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html' itemprop='url' title='Q1&#39;10 spam &amp; virus trends from Postini'> Q1&#39;10 spam &amp; virus trends from Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, April 14, 2010 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="text-align: left;"><span class="Apple-style-span" style="font-style: italic;"><b>Editor's note: </b>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 18 million business users.</span></div><div><br /></div><div>In 2009, the security community started seeing diminishing returns from the takedown of malicious ISPs. After the ISP 3FN was taken down, spam levels rebounded in less than a month, and after Real Host went down, spam volumes recovered after only two days. In response, the anti-spam community turned its attention toward taking botnets offline instead.</div><div><br /></div><div>Toward the end of 2009, Mega-D, a top-10 botnet &#8211; responsible for infecting more than 250,000 computers worldwide &#8211; was severely crippled through a carefully orchestrated campaign designed to isolate the command-and-control servers spammers were using to support the botnet. In early 2010, security professionals, along with government agencies, successfully mounted a campaign against several more targets: major botnets such as Waledac, Mariposa, and Zeus were either <a href="http://news.bbc.co.uk/2/hi/technology/8570993.stm">shut down</a> or had their operations significantly curtailed.</div><div><br /></div><div>However, this recent spate of botnet takedowns has not had a dramatic impact on spam levels. Although spam and virus levels did fall below Q4&#8217;09 highs, reports from Google&#8217;s global analytics show that spam levels held relatively steady over the course of Q1&#8217;10. </div><div><br /></div><div>This suggests that there&#8217;s no shortage of botnets out there for spammers to use. If one botnet goes offline, spammers simply buy, rent, or deploy another, making it difficult for the anti-spam community to make significant inroads in the fight against spam with individual botnet takedowns.</div><div><br /></div><div><b>Spam by the numbers<br /></b>Overall, spam volume fell 12% from Q4&#8217;09 to Q1&#8217;10, which follows a trend of quarterly decreases in overall spam levels that started after the surge in Q2&#8217;09. This may be attributed to some of the recent takedowns, but spam volume was still 6% higher this quarter than it was <a href="ttp://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html">during the same period in 2009</a>, and spam volume as a percentage of total email messages is holding steady.<br /><br /></div><div><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780352837545906" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJTcKJ77I/AAAAAAAAAWs/EFCfINPvGX0/s400/WA30-1004_Q1-Spam-Trends_Spam-User_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 289px;"></span></div><div style="text-align: left;"><br />Recently, our data centers showed a 30% increase in the size of individual spam messages (measured in bytes) that occurred toward the end of March, as shown below.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780346882095602" src="//4.bp.blogspot.com/_jSdgG4-DeNE/S8UJTF-Q-fI/AAAAAAAAAWk/Rem9Rva4q2E/s400/WA30-1004_Q1-Spam-Trends_Spam-Bytes_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div style="text-align: left;"><br />This spike points to a resurgence of image spam, similar to <a href="http://googleenterprise.blogspot.com/2009/07/q2-2009-spam-trends.html">what we reported in Q2&#8217;09</a>. This is likely due to the fact that reusing image templates makes it easier and faster for spammers to start new campaigns.</div><div style="text-align: left;"><div style="text-align: left;"><br /></div><div style="text-align: left;">As always, spammers tend to make use of predictable topics &#8211; cheap pharmaceuticals, celebrity gossip, breaking news &#8211; to encourage user clicks. In January, spammers hastened to exploit the Haiti earthquake crisis, sending pleas for donations that appeared to have been sent by reputable charitable organizations, politicians, and celebrities.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">The frequency and variety of post-earthquake spam illustrates an unpleasant reality: spammers will exploit any means &#8211; even tragedies &#8211; to accomplish their objectives.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style="color: rgb(0, 0, 238);"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780341419184418" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJSxnzkSI/AAAAAAAAAWc/bXuiE1xbRA0/s400/WA30-1004_Q1-Spam-Trends_Payload_v2.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div><div><b><br />Virus levels fall after Q4&#8217;09 surge<br /></b>During 2009, spam with attached viruses increased tenfold, with levels rising from 0.3% of total spam in the first half of the year to 3.7% in the second. Postini filters blocked more than 100 million virus-bearing messages per day during the worst of the attack.</div><div><br /></div><div><div>Since then, spam with attached viruses leveled off to around 1.1% in Q1&#8217;10, and dropped as low as 0.7% in March. It&#8217;s good news that virus levels are currently trending down &#8211; but Q1&#8217;10 levels are still 12-fold higher than they were in Q1&#8217;09.</div></div><div><br /></div><div>In fact, this virus surge may be part of the reason that there hasn&#8217;t been a significant impact on spam volume after the recent takedown of major botnets. With a host of new machines now infected and part of a botnet, it is unlikely that there would be a dip in spam proliferation.</div><div><br /></div><div><b>Benefits of security in the cloud</b><br />Although the botnets that distribute spam are mindless drones, the spammers that take advantage of these botnets are a highly active and adaptable group. This is evidenced by the varied techniques and tactics that they employ in an ongoing effort to evade spam filters and deliver messages to their targets.</div><div><br /></div><div>2010 is likely to see more botnets taken offline, but the question remains &#8211; will that have a long-term impact on spam volumes overall? So far in 2010, the effect has been limited, and the security community may begin to turn to other tactics that yield a more substantial impact on global spam volumes.</div><div><br /></div><div>As long as the threat is there, however, Google is committed to using the power of the cloud to protect your enterprise from spam and viruses. Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your inbox.</div><div><br /></div><div>For more information on how Google&#8217;s security and archiving services can help your business stay safe and compliant, please visit <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-Q110_spam_trends&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20">www.google.com/postini</a>.</div><div><br /></div><div>Posted by Gopal Shah, Google Postini Services team</div></div></div><div style="text-align: left;"><br /></div> </script> <noscript> <div style="text-align: left;"><span class="Apple-style-span" style="font-style: italic;"><b>Editor's note: </b>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 18 million business users.</span></div><div><br /></div><div>In 2009, the security community started seeing diminishing returns from the takedown of malicious ISPs. After the ISP 3FN was taken down, spam levels rebounded in less than a month, and after Real Host went down, spam volumes recovered after only two days. In response, the anti-spam community turned its attention toward taking botnets offline instead.</div><div><br /></div><div>Toward the end of 2009, Mega-D, a top-10 botnet &#8211; responsible for infecting more than 250,000 computers worldwide &#8211; was severely crippled through a carefully orchestrated campaign designed to isolate the command-and-control servers spammers were using to support the botnet. In early 2010, security professionals, along with government agencies, successfully mounted a campaign against several more targets: major botnets such as Waledac, Mariposa, and Zeus were either <a href="http://news.bbc.co.uk/2/hi/technology/8570993.stm">shut down</a> or had their operations significantly curtailed.</div><div><br /></div><div>However, this recent spate of botnet takedowns has not had a dramatic impact on spam levels. Although spam and virus levels did fall below Q4&#8217;09 highs, reports from Google&#8217;s global analytics show that spam levels held relatively steady over the course of Q1&#8217;10. </div><div><br /></div><div>This suggests that there&#8217;s no shortage of botnets out there for spammers to use. If one botnet goes offline, spammers simply buy, rent, or deploy another, making it difficult for the anti-spam community to make significant inroads in the fight against spam with individual botnet takedowns.</div><div><br /></div><div><b>Spam by the numbers<br /></b>Overall, spam volume fell 12% from Q4&#8217;09 to Q1&#8217;10, which follows a trend of quarterly decreases in overall spam levels that started after the surge in Q2&#8217;09. This may be attributed to some of the recent takedowns, but spam volume was still 6% higher this quarter than it was <a href="ttp://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html">during the same period in 2009</a>, and spam volume as a percentage of total email messages is holding steady.<br /><br /></div><div><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780352837545906" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJTcKJ77I/AAAAAAAAAWs/EFCfINPvGX0/s400/WA30-1004_Q1-Spam-Trends_Spam-User_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 289px;"></span></div><div style="text-align: left;"><br />Recently, our data centers showed a 30% increase in the size of individual spam messages (measured in bytes) that occurred toward the end of March, as shown below.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style=""><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780346882095602" src="//4.bp.blogspot.com/_jSdgG4-DeNE/S8UJTF-Q-fI/AAAAAAAAAWk/Rem9Rva4q2E/s400/WA30-1004_Q1-Spam-Trends_Spam-Bytes_v3.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div style="text-align: left;"><br />This spike points to a resurgence of image spam, similar to <a href="http://googleenterprise.blogspot.com/2009/07/q2-2009-spam-trends.html">what we reported in Q2&#8217;09</a>. This is likely due to the fact that reusing image templates makes it easier and faster for spammers to start new campaigns.</div><div style="text-align: left;"><div style="text-align: left;"><br /></div><div style="text-align: left;">As always, spammers tend to make use of predictable topics &#8211; cheap pharmaceuticals, celebrity gossip, breaking news &#8211; to encourage user clicks. In January, spammers hastened to exploit the Haiti earthquake crisis, sending pleas for donations that appeared to have been sent by reputable charitable organizations, politicians, and celebrities.</div><div style="text-align: left;"><br /></div><div style="text-align: left;">The frequency and variety of post-earthquake spam illustrates an unpleasant reality: spammers will exploit any means &#8211; even tragedies &#8211; to accomplish their objectives.<br /><br /></div><div style="text-align: left;"><span class="Apple-style-span" style="color: rgb(0, 0, 238);"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5459780341419184418" src="//2.bp.blogspot.com/_jSdgG4-DeNE/S8UJSxnzkSI/AAAAAAAAAWc/bXuiE1xbRA0/s400/WA30-1004_Q1-Spam-Trends_Payload_v2.jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 273px;"></span></div><div><div><b><br />Virus levels fall after Q4&#8217;09 surge<br /></b>During 2009, spam with attached viruses increased tenfold, with levels rising from 0.3% of total spam in the first half of the year to 3.7% in the second. Postini filters blocked more than 100 million virus-bearing messages per day during the worst of the attack.</div><div><br /></div><div><div>Since then, spam with attached viruses leveled off to around 1.1% in Q1&#8217;10, and dropped as low as 0.7% in March. It&#8217;s good news that virus levels are currently trending down &#8211; but Q1&#8217;10 levels are still 12-fold higher than they were in Q1&#8217;09.</div></div><div><br /></div><div>In fact, this virus surge may be part of the reason that there hasn&#8217;t been a significant impact on spam volume after the recent takedown of major botnets. With a host of new machines now infected and part of a botnet, it is unlikely that there would be a dip in spam proliferation.</div><div><br /></div><div><b>Benefits of security in the cloud</b><br />Although the botnets that distribute spam are mindless drones, the spammers that take advantage of these botnets are a highly active and adaptable group. This is evidenced by the varied techniques and tactics that they employ in an ongoing effort to evade spam filters and deliver messages to their targets.</div><div><br /></div><div>2010 is likely to see more botnets taken offline, but the question remains &#8211; will that have a long-term impact on spam volumes overall? So far in 2010, the effect has been limited, and the security community may begin to turn to other tactics that yield a more substantial impact on global spam volumes.</div><div><br /></div><div>As long as the threat is there, however, Google is committed to using the power of the cloud to protect your enterprise from spam and viruses. Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your inbox.</div><div><br /></div><div>For more information on how Google&#8217;s security and archiving services can help your business stay safe and compliant, please visit <a href="//www.google.com/postini/index.html#utm_campaign=en&amp;utm_source=en-blog-na-us-Q110_spam_trends&amp;utm_medium=blog&amp;utm_term=enterprise_blog%20">www.google.com/postini</a>.</div><div><br /></div><div>Posted by Gopal Shah, Google Postini Services team</div></div></div><div style="text-align: left;"><br /></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q1&#39;10 spam &amp; virus trends from Postini&url=https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='1' data-onclick='' data-post-url='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html' data-url='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2010/04/q1-spam-virus-trends-from-postini.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Apps' rel='tag'> Google Apps </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='2086247892166358555' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html' itemprop='url' title='Q3&#39;09 Spam &amp; Virus Trends from Postini'> Q3&#39;09 Spam &amp; Virus Trends from Postini </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Thursday, October 1, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style=";font-family:arial;font-size:100%;" ><b></b><i><span style="background-color: rgb(244, 204, 204);"><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 15 million business users. </span></span></i><b><br /></b><br /> Back in 2007, we saw the first variants of a big virus attack later labeled the "Storm" virus. During that summer, Storm attacked with<span style="background-color: rgb(255, 255, 255);"> force, pushing payload spam activity to then-unprecedented levels and sustaining them for several months. The security community eventually caught up, and payload spam activity fell to nominal levels and held there. That is, until this year: Q2'09 saw a significant surge in payload spam activity, and now</span> Q3'09 levels have made the 2007 Storm virus attack look small in comparison. Postini data centers have blocked more than 100 million viruses every day during what has so far been the height of the attack.<br /><br /></span><span style=";font-family:arial;font-size:100%;" ><div id="nh_p" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="u4-g"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_5g2pgm2m9_b" style="width: 524px; height: 358px;" /> </div> <br /></div> The majority (55%) of these viruses are messages like the one you see below, a fake notice of underreported income from the IRS (<span style="background-color: rgb(255, 255, 255);"><a href="http://www.us-cert.gov/current/#malicious_code_spreading_via_irs" id="a3sf" title="which the IRS distributed an alert on earlier this week">which the IRS distributed an alert on earlier this week</a></span>). Another large contingent (33%) have come in the form of fake package tracking attachments, which were already on the rise in Q2. <span style="background-color: rgb(255, 255, 255);">You might think a spoofed IRS notice or package tracking email is obviously spam, and wonder who would fall for it and actually click on the attachment.<br /><br />However, at these volumes, it takes only a tiny fraction of the recipients being fooled for the spammers to add hundreds of computers to their botnets every day.</span> </span> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"><div id="ws21" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_4dzqbtdwn_b" style="width: 523px; height: 305px;" /></span></div> </div> <div id="furf" style="text-align: left;"> </div> <span style="font-size:100%;"><br /><b>ISP takedowns continue, overall spam levels steady</b><br /><br /><span style="background-color: rgb(255, 255, 255);"><span style="background-color: rgb(255, 255, 255);">Last quarter we saw a temporary 30% drop in overall spam levels following the <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="f8xt" target="_blank" title="3FN ISP takedown">3FN ISP takedown</a>, and the ISP takedown trend continues into Q3 with a new culprit called Real Host, a large Latvia-based ISP that was </span><a href="http://www.networkworld.com/news/2009/080509-after-links-to-cybercrime-latvian.html" id="ff-q" target="_blank" title="disconnected">disconnected</a> by upstream providers on August 1. This takedown didn't have the same drastic effects of McColo (last November<span style="background-color: rgb(255, 255, 255);">), but it was comparable to 3FN. Ultimately, the </span>effects of the Real Host takedown lasted only two days, with an initial 30% drop in spam followed by a quick resurgence. </span></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Overall, spam levels remained steady this quarter, with little growth or decline since the Real Host incident. In Q3, spam as a percentage of total message volume is hovering around 90%, down from the Q2 average of around 95%. <span style="background-color: rgb(255, 255, 255);">Q3'09 average spam levels were down 8% from Q2'09 and on par with levels in Q3'08. Spam levels also saw smaller ups and downs than in previous quarters. </span></span><br /><br /></span> <div style="text-align: center;"><div style="text-align: center;"> </div><div id="r6kh" style="text-align: left;"><div style="text-align: center;"> </div><div id="d19b" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_18gtjk4bhk_b" style="width: 524px; height: 358px;" /></span></div> </div> </div> </div> <span style="font-size:100%;"><b> <div style="text-align: left;"> <span style="font-weight: normal;"><br /> </span> </div> </b></span> <div> <span style="font-size:100%;"><b>Older spam techniques driving message size up<br /><br /> </b>Last quarter we reported on the trend toward larger message sizes, measured in bytes. The trend has continued into this quarter, making 2009 a year of resurgence in old techniques such as image spam and payload viruses<span style="background-color: rgb(255, 255, 255);">. </span>When considering the spam bytes processed per user, growth has been steep in 2009, with Q3'09 rates up 123% from Q3'08.<br /><br />Organizations that process spam inside their network should pay attention to this trend. The larger sizes create a bandwidth burden that can impact speed across your network. As the chart shows, Q2'09 delivered the record high to date for spam size &#8211; and subsequently for bandwidth drag for teams that manage spam in-house, potentially forcing those organizations to upgrade their capacity limits.<br /><br /> </span> <div id="l15t" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_21nq6sqmdx_b" style="width: 524px; height: 359px;" /></span></div> </div> <div> <span style="font-size:100%;"><b><br /> </b><b>Best practices to optimize your enterprise spam filter</b><br /> <br />A common piece of feedback we get from our customers is that many of the messages in their spam folder or quarantine seem to come from "them" &#8211; from what appear to be valid email addresses from their own domain. These email addresses are actually spoofed (a common technique to mask the real origins of a message), and spammers employ this technique to take advantage of a mistake organizations sometimes make in configuring their spam filters: adding their own domain to their approved sender list.<br /><br />While this might seem like a good idea at first glance &#8211; we want to make sure we don't block email from our colleagues, right? &#8211; in practice all it does is open your organization up to spoofed email. With that in mind, we strongly recommend that organizations not add their own domains to their approved sender lists. (Don't worry &#8211; legitimate mail from within your domain is correctly identified by filters and generally gets through just fine.) <b><br /> <br /> </b>For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit<b><b> <a href="//www.google.com/postini" id="ar5o" title="www.google.com/postini">www.google.com/postini</a>.<br /> </b><b><br /> </b></b> Posted by Adam Swidler, Google Postini Services team </span></div></div></div> </script> <noscript> <span style=";font-family:arial;font-size:100%;" ><b></b><i><span style="background-color: rgb(244, 204, 204);"><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which processes more than 3 billion email connections per day in the course of providing email security to more than 50,000 businesses and 15 million business users. </span></span></i><b><br /></b><br /> Back in 2007, we saw the first variants of a big virus attack later labeled the "Storm" virus. During that summer, Storm attacked with<span style="background-color: rgb(255, 255, 255);"> force, pushing payload spam activity to then-unprecedented levels and sustaining them for several months. The security community eventually caught up, and payload spam activity fell to nominal levels and held there. That is, until this year: Q2'09 saw a significant surge in payload spam activity, and now</span> Q3'09 levels have made the 2007 Storm virus attack look small in comparison. Postini data centers have blocked more than 100 million viruses every day during what has so far been the height of the attack.<br /><br /></span><span style=";font-family:arial;font-size:100%;" ><div id="nh_p" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="u4-g"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_5g2pgm2m9_b" style="width: 524px; height: 358px;" /> </div> <br /></div> The majority (55%) of these viruses are messages like the one you see below, a fake notice of underreported income from the IRS (<span style="background-color: rgb(255, 255, 255);"><a href="http://www.us-cert.gov/current/#malicious_code_spreading_via_irs" id="a3sf" title="which the IRS distributed an alert on earlier this week">which the IRS distributed an alert on earlier this week</a></span>). Another large contingent (33%) have come in the form of fake package tracking attachments, which were already on the rise in Q2. <span style="background-color: rgb(255, 255, 255);">You might think a spoofed IRS notice or package tracking email is obviously spam, and wonder who would fall for it and actually click on the attachment.<br /><br />However, at these volumes, it takes only a tiny fraction of the recipients being fooled for the spammers to add hundreds of computers to their botnets every day.</span> </span> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"><div id="ws21" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_4dzqbtdwn_b" style="width: 523px; height: 305px;" /></span></div> </div> <div id="furf" style="text-align: left;"> </div> <span style="font-size:100%;"><br /><b>ISP takedowns continue, overall spam levels steady</b><br /><br /><span style="background-color: rgb(255, 255, 255);"><span style="background-color: rgb(255, 255, 255);">Last quarter we saw a temporary 30% drop in overall spam levels following the <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="f8xt" target="_blank" title="3FN ISP takedown">3FN ISP takedown</a>, and the ISP takedown trend continues into Q3 with a new culprit called Real Host, a large Latvia-based ISP that was </span><a href="http://www.networkworld.com/news/2009/080509-after-links-to-cybercrime-latvian.html" id="ff-q" target="_blank" title="disconnected">disconnected</a> by upstream providers on August 1. This takedown didn't have the same drastic effects of McColo (last November<span style="background-color: rgb(255, 255, 255);">), but it was comparable to 3FN. Ultimately, the </span>effects of the Real Host takedown lasted only two days, with an initial 30% drop in spam followed by a quick resurgence. </span></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Overall, spam levels remained steady this quarter, with little growth or decline since the Real Host incident. In Q3, spam as a percentage of total message volume is hovering around 90%, down from the Q2 average of around 95%. <span style="background-color: rgb(255, 255, 255);">Q3'09 average spam levels were down 8% from Q2'09 and on par with levels in Q3'08. Spam levels also saw smaller ups and downs than in previous quarters. </span></span><br /><br /></span> <div style="text-align: center;"><div style="text-align: center;"> </div><div id="r6kh" style="text-align: left;"><div style="text-align: center;"> </div><div id="d19b" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_18gtjk4bhk_b" style="width: 524px; height: 358px;" /></span></div> </div> </div> </div> <span style="font-size:100%;"><b> <div style="text-align: left;"> <span style="font-weight: normal;"><br /> </span> </div> </b></span> <div> <span style="font-size:100%;"><b>Older spam techniques driving message size up<br /><br /> </b>Last quarter we reported on the trend toward larger message sizes, measured in bytes. The trend has continued into this quarter, making 2009 a year of resurgence in old techniques such as image spam and payload viruses<span style="background-color: rgb(255, 255, 255);">. </span>When considering the spam bytes processed per user, growth has been steep in 2009, with Q3'09 rates up 123% from Q3'08.<br /><br />Organizations that process spam inside their network should pay attention to this trend. The larger sizes create a bandwidth burden that can impact speed across your network. As the chart shows, Q2'09 delivered the record high to date for spam size &#8211; and subsequently for bandwidth drag for teams that manage spam in-house, potentially forcing those organizations to upgrade their capacity limits.<br /><br /> </span> <div id="l15t" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_21nq6sqmdx_b" style="width: 524px; height: 359px;" /></span></div> </div> <div> <span style="font-size:100%;"><b><br /> </b><b>Best practices to optimize your enterprise spam filter</b><br /> <br />A common piece of feedback we get from our customers is that many of the messages in their spam folder or quarantine seem to come from "them" &#8211; from what appear to be valid email addresses from their own domain. These email addresses are actually spoofed (a common technique to mask the real origins of a message), and spammers employ this technique to take advantage of a mistake organizations sometimes make in configuring their spam filters: adding their own domain to their approved sender list.<br /><br />While this might seem like a good idea at first glance &#8211; we want to make sure we don't block email from our colleagues, right? &#8211; in practice all it does is open your organization up to spoofed email. With that in mind, we strongly recommend that organizations not add their own domains to their approved sender lists. (Don't worry &#8211; legitimate mail from within your domain is correctly identified by filters and generally gets through just fine.) <b><br /> <br /> </b>For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit<b><b> <a href="//www.google.com/postini" id="ar5o" title="www.google.com/postini">www.google.com/postini</a>.<br /> </b><b><br /> </b></b> Posted by Adam Swidler, Google Postini Services team </span></div></div></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q3&#39;09 Spam &amp; Virus Trends from Postini&url=https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='2' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html' data-url='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/10/q3-spam-virus-trends-from-postini.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='1275121112555465549' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html' itemprop='url' title='Q2 2009 Spam Trends'> Q2 2009 Spam Trends </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, July 1, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div style="font-family:arial;"> <span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's Note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which provide email security to more than 50,000 organizations, including businesses of all sizes, government agencies, and educational institutions. To learn more about what the Gmail team is doing to keep spam out of your inboxes, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">this post</span></a>. </span></i></span> </div> <span style=";font-family:arial;font-size:100%;" ><br /><a href="http://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html" id="e5qm" style="background-color: rgb(255, 255, 255);" target="_blank" title="Our update last quarter">Our "Spam Trend" update last quarter</a><span style="background-color: rgb(255, 255, 255);"> summarized the rise in both levels and types of spam, with new players and techniques entering the market. This quarter, proliferation continues, with an unpredictable pattern of drops and spikes as 2009 moves along. Overall, spam is measurably up: Q2'09 average spam levels are 53% higher than in Q1'09 and 6% higher than in Q2'08.</span><br /></span><div style="font-family:arial;"><span style="font-size:100%;"><br /><span style="background-color: rgb(255, 255, 255);">After last November's McColo ISP takedown, when spam volumes dropped by 70%, spammers worked overtime to fill the void. They succeeded: Within four months, spam levels rose back to pre-McColo levels. This upward trend continued through June 4, when another large ISP spam source, 3FN, <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="o-st" title="was reported to have been dismantled">was reported to have been dismantled</a>. Spam volume immediately dropped 30% &#8211; not as extreme as McColo, but still significant. Although this created a sudden dip in spam levels, it also created an open invitation for opportunistic spammers to once again seize a market opportunity.<br /><br />Over the coming months, we anticipate watching new players once again drive spam levels back up. Since June 4, spammers have already made up a significant amount of ground, climbing 14% from the initial drop.<br /> <br />Here's what the trend looked like, as tracked through Postini filters, over the past six months:<br /><br /> </span><span style="background-color: rgb(255, 255, 255);"><div id="ry0r" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="qgkd"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_693gfvdr8ds_b" style="width: 520px; height: 355px;" /> </div> </div> <br />"Unpredictability" summarizes the overall trend as <span style="background-color: rgb(255, 255, 255);">Q2'09</span> winds down and spammers test both new and "retro" techniques. For example, on June 18 we tracked a new attack that unleashed 50% of a typical day's spam volume in just two hours' time. This attack used a simple "newsletter" template &#8211; somewhat "old school" by today's spam standard &#8211; with malevolent links and images inserted into the content. Google's Postini filters detected more than 11,000 variants of this spam during those two hours. Because this spam enabled spoofing of the recipient domain <span style="background-color: rgb(255, 255, 255);">(meaning the "from" field was falsified)</span>, distribution lists were especially hard-hit by this attack.</span></span> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <div id="t8-d"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;"><b>Resurgence of image spam<br /> <br /> </b>One of the other trends we're watching closely is the sudden popularity of "image spam"<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>a form of spam that rose to prominence in 2007, before most anti-spam filters learned how to block it. It's simple stuff: basic email with advertising content, usually containing a related image. They can also include malicious links or content<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>and either way, the large file size of an image spam can place a heavy load on an email network.<br /><br />An image spam email might look something like this:<br /><br /></span> <div id="ejfy" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_696fmnv2kmw_b" style="width: 520px; height: 410px;" /><br /></span></div> <span style="font-size:100%;"><br /></span> </div> </div> <span style=";font-family:Trebuchet MS;font-size:100%;" >Evidence of<span style="background-color: rgb(255, 255, 255);"> the resurgence in image spam can be seen in the graph below, which shows that the actual size of spam messages, measured in bytes, is back on the rise:</span><br /> <br /> </span> <div id="lz9n" style="text-align: left; font-family: arial;"><div style="text-align: center;"> </div><div id="el2-" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="om23"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_694gpjw5xfr_b" style="width: 520px; height: 356px;" /></span> </div> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />There are a couple of possible explanations for the resurgence in image spam, despite the fact that most spam filters out there have adapted to the technique. One theory is that this wave is designed to test the defenses</span> of the different spam filters out there, so that spammers can do statistical analysis on what subject lines and content have the highest probability of success.<br /><br />Another is that there may be some new players entering the spam game, following the McColo and 3FN takedowns, and these new players are opening with some well-tested techniques. Either way, we're watching this trend and will share insights as we gain them in the weeks and months ahead.<br /><br /></span> <div id="rk54" style="text-align: left;"> <span style="font-size:100%;"><b>Spike in payload viruses</b></span> </div> <div id="qzym" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;">June was also an active month for viruses sent as email attachments, otherwise known as "payload viruses." Volumes rose to their highest level in almost two years as spammers returned to yet another tried-and-true technique to expand their <a href="http://en.wikipedia.org/wiki/Botnet" id="i7sx" title="botnets">botnets</a>.<br /><br />As you can see in the chart below, June's activity is almost as high as the two-month payload virus surge seen in Q3'07. Fortunately, Google's Postini zero-hour heuristics detected this uprise early and kept payload attacks in the cloud and away from users' email networks. </span> <div id="tnmj" style="text-align: left;"> <div id="j_5x" style="text-align: left;"> <span style="font-size:100%;"><br /></span> <div id="zp9j" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="w9:j"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_698ctj4fgfp_b" style="width: 520px; height: 355px;" /></span> </div> </div> </div> <div id="xttd" style="text-align: left;"> <span style="font-size:100%;"><br /><b>Everything old might be new again</b><br /><br />In summary, <span style="background-color: rgb(255, 255, 255);">Q2'09</span> saw continued unpredictability and the resurgence of old-style spam attacks. Are spammers finally running out of original ideas? And if so, like Hollywood, are we now starting to see spam "remakes," based on originals of a few years ago? And what are spammers looking to accomplish as they unleash these remakes? Only time will tell. </span> </div> <div id="tvhu" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <div id="iht_" style="text-align: left;"><span style="font-size:100%;"> For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit <a href="//www.google.com/postini" id="qvqb" title="www.google.com/postini">www.google.com/postini</a>.<br /><br /></span><div> <span style="font-size:100%;">Posted by Amanda Kleha, </span><span style="font-size:100%;">Google message security and archiving team </span> </div> <span style="font-size:100%;"><br /></span></div> </div> </div> </div> </script> <noscript> <div style="font-family:arial;"> <span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);"><span style="font-weight: bold;">Editor's Note: </span>The spam data cited in this post is drawn from the network of Google email security and archiving services, powered by Postini, which provide email security to more than 50,000 organizations, including businesses of all sizes, government agencies, and educational institutions. To learn more about what the Gmail team is doing to keep spam out of your inboxes, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">this post</span></a>. </span></i></span> </div> <span style=";font-family:arial;font-size:100%;" ><br /><a href="http://googleenterprise.blogspot.com/2009/03/spam-data-and-trends-q1-2009.html" id="e5qm" style="background-color: rgb(255, 255, 255);" target="_blank" title="Our update last quarter">Our "Spam Trend" update last quarter</a><span style="background-color: rgb(255, 255, 255);"> summarized the rise in both levels and types of spam, with new players and techniques entering the market. This quarter, proliferation continues, with an unpredictable pattern of drops and spikes as 2009 moves along. Overall, spam is measurably up: Q2'09 average spam levels are 53% higher than in Q1'09 and 6% higher than in Q2'08.</span><br /></span><div style="font-family:arial;"><span style="font-size:100%;"><br /><span style="background-color: rgb(255, 255, 255);">After last November's McColo ISP takedown, when spam volumes dropped by 70%, spammers worked overtime to fill the void. They succeeded: Within four months, spam levels rose back to pre-McColo levels. This upward trend continued through June 4, when another large ISP spam source, 3FN, <a href="http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html" id="o-st" title="was reported to have been dismantled">was reported to have been dismantled</a>. Spam volume immediately dropped 30% &#8211; not as extreme as McColo, but still significant. Although this created a sudden dip in spam levels, it also created an open invitation for opportunistic spammers to once again seize a market opportunity.<br /><br />Over the coming months, we anticipate watching new players once again drive spam levels back up. Since June 4, spammers have already made up a significant amount of ground, climbing 14% from the initial drop.<br /> <br />Here's what the trend looked like, as tracked through Postini filters, over the past six months:<br /><br /> </span><span style="background-color: rgb(255, 255, 255);"><div id="ry0r" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="qgkd"> <img src="https://docs.google.com/a/google.com/File?id=d68vshw_693gfvdr8ds_b" style="width: 520px; height: 355px;" /> </div> </div> <br />"Unpredictability" summarizes the overall trend as <span style="background-color: rgb(255, 255, 255);">Q2'09</span> winds down and spammers test both new and "retro" techniques. For example, on June 18 we tracked a new attack that unleashed 50% of a typical day's spam volume in just two hours' time. This attack used a simple "newsletter" template &#8211; somewhat "old school" by today's spam standard &#8211; with malevolent links and images inserted into the content. Google's Postini filters detected more than 11,000 variants of this spam during those two hours. Because this spam enabled spoofing of the recipient domain <span style="background-color: rgb(255, 255, 255);">(meaning the "from" field was falsified)</span>, distribution lists were especially hard-hit by this attack.</span></span> <span style="font-size:100%;"><br /></span> </div> <div style="font-family:arial;"> <div id="t8-d"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;"><b>Resurgence of image spam<br /> <br /> </b>One of the other trends we're watching closely is the sudden popularity of "image spam"<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>a form of spam that rose to prominence in 2007, before most anti-spam filters learned how to block it. It's simple stuff: basic email with advertising content, usually containing a related image. They can also include malicious links or content<span style="background-color: rgb(255, 255, 255);"> &#8211; </span>and either way, the large file size of an image spam can place a heavy load on an email network.<br /><br />An image spam email might look something like this:<br /><br /></span> <div id="ejfy" style="text-align: left;"><div style="text-align: center;"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_696fmnv2kmw_b" style="width: 520px; height: 410px;" /><br /></span></div> <span style="font-size:100%;"><br /></span> </div> </div> <span style=";font-family:Trebuchet MS;font-size:100%;" >Evidence of<span style="background-color: rgb(255, 255, 255);"> the resurgence in image spam can be seen in the graph below, which shows that the actual size of spam messages, measured in bytes, is back on the rise:</span><br /> <br /> </span> <div id="lz9n" style="text-align: left; font-family: arial;"><div style="text-align: center;"> </div><div id="el2-" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="om23"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_694gpjw5xfr_b" style="width: 520px; height: 356px;" /></span> </div> <span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />There are a couple of possible explanations for the resurgence in image spam, despite the fact that most spam filters out there have adapted to the technique. One theory is that this wave is designed to test the defenses</span> of the different spam filters out there, so that spammers can do statistical analysis on what subject lines and content have the highest probability of success.<br /><br />Another is that there may be some new players entering the spam game, following the McColo and 3FN takedowns, and these new players are opening with some well-tested techniques. Either way, we're watching this trend and will share insights as we gain them in the weeks and months ahead.<br /><br /></span> <div id="rk54" style="text-align: left;"> <span style="font-size:100%;"><b>Spike in payload viruses</b></span> </div> <div id="qzym" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <span style="font-size:100%;">June was also an active month for viruses sent as email attachments, otherwise known as "payload viruses." Volumes rose to their highest level in almost two years as spammers returned to yet another tried-and-true technique to expand their <a href="http://en.wikipedia.org/wiki/Botnet" id="i7sx" title="botnets">botnets</a>.<br /><br />As you can see in the chart below, June's activity is almost as high as the two-month payload virus surge seen in Q3'07. Fortunately, Google's Postini zero-hour heuristics detected this uprise early and kept payload attacks in the cloud and away from users' email networks. </span> <div id="tnmj" style="text-align: left;"> <div id="j_5x" style="text-align: left;"> <span style="font-size:100%;"><br /></span> <div id="zp9j" style="text-align: left;"><div style="text-align: center;"> </div><div style="text-align: center;" id="w9:j"> <span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_698ctj4fgfp_b" style="width: 520px; height: 355px;" /></span> </div> </div> </div> <div id="xttd" style="text-align: left;"> <span style="font-size:100%;"><br /><b>Everything old might be new again</b><br /><br />In summary, <span style="background-color: rgb(255, 255, 255);">Q2'09</span> saw continued unpredictability and the resurgence of old-style spam attacks. Are spammers finally running out of original ideas? And if so, like Hollywood, are we now starting to see spam "remakes," based on originals of a few years ago? And what are spammers looking to accomplish as they unleash these remakes? Only time will tell. </span> </div> <div id="tvhu" style="text-align: left;"> <span style="font-size:100%;"><br /></span> </div> <div id="iht_" style="text-align: left;"><span style="font-size:100%;"> For more information on how Google email security services, powered by Postini, can help your organization provide better spam protection and take a load off your network by halting spam in the cloud, visit <a href="//www.google.com/postini" id="qvqb" title="www.google.com/postini">www.google.com/postini</a>.<br /><br /></span><div> <span style="font-size:100%;">Posted by Amanda Kleha, </span><span style="font-size:100%;">Google message security and archiving team </span> </div> <span style="font-size:100%;"><br /></span></div> </div> </div> </div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Q2 2009 Spam Trends&url=https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='22' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html' data-url='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/07/q2-2009-spam-trends.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/admin' rel='tag'> admin </a> , <a class='label' href='https://cloud.googleblog.com/search/label/enterprise' rel='tag'> enterprise </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Apps' rel='tag'> Google Apps </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/hints%20and%20tips' rel='tag'> hints and tips </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='3933669717817126620' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html' itemprop='url' title='Spam data and trends: Q1 2009'> Spam data and trends: Q1 2009 </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Tuesday, March 31, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <div><div><span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);">Editor's Note: The spam data cited in this post is drawn from the Google enterprise security and archiving security network (Postini), which delivers an added layer of security for standalone mail servers and Google Apps Premier Edition customers. For a discussion of the anti-spam measures included in Gmail, please <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">see this post from the Gmail blog. </a></span></i></span><i><span style="background-color: rgb(255, 255, 255);"><a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><br /></a></span></i></div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">In providing email security to more than 50,000 businesses and 15 million business users, Google security and archiving services, powered by <a id="knm_" title="Postini" href="//www.google.com/postini/">Postini</a>, process and cull spam from more than three billion enterprise email connections every day. This gives us strong insights into the state of the spam industry, some of which we share i<span style="background-color: rgb(255, 255, 255);">n </span><span style="background-color: rgb(255, 255, 255);"><span style="text-decoration: none;"><a id="sz2v" title="regular posts to this blog" href="http://googleenterprise.blogspot.com/search/label/spam%20and%20security%20trends">regular posts to this blog</a></span></span><span style="background-color: rgb(255, 255, 255);">.<br /><br />R</span>ead on for a quick overview of spam trends and events in the first quarter of 2009.<br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>What we saw in the Postini data centers</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most significant spam-related event in the first quarter of 2009 occurred when spam volume returned to <a id="r7x." title="pre-McColo takedown levels" href="http://googleenterprise.blogspot.com/2008/11/fighting-spam-just-got-little-easier.html">pre-McColo takedown levels</a>. By the second half of March, seven-day average spam volume was at the same volume we saw prior to <a id="y.sj" title="the blocking of ISP McColo in November 2008" href="http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html">the blocking of the McColo ISP in November 2008</a>.<br /><br /></span></div> <div><div style="text-align: center;"> </div><div id="e5gx" style="text-align: left;"><div style="text-align: center;"> </div><div id="esrn" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_102f833rgg_b" style="width: 500px; height: 343px;" /></span></div> </div></div> <div><span style="font-size:100%;"><br />Spammers have clearly rallied following the McColo takedown, and o<span style="background-color: rgb(255, 255, 255);">verall </span><span style="background-color: rgb(255, 255, 255);">spam</span><span style="background-color: rgb(255, 255, 255);"> volume growth during Q1 2009 was the strongest it's been</span> since early 2008, increasing an <span style="background-color: rgb(255, 255, 255);">average of </span><span style="background-color: rgb(255, 255, 255);">1.2% per day. To put that number into context, the growth rate of spam volume in Q1 2008 was <span style="background-color: rgb(255, 255, 255);">approximately 1% per day &#8211; which, at the time, was a record high.</span></span></span> </div> <div id="x636" style="text-align: left;"> <div> <div> <div id="x636" style="text-align: left;"> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Of course, like every year before it,</span> 2008 set a new record for overall spam volume. But in 2008 spam growth flattened over the summer and early fall, and then fell off a cliff after the McColo takedown (daily growth declined to .8%, .3%, and then .01% in the last three quarters of the year). <span style="background-color: rgb(255, 255, 255);">T</span><span style="background-color: rgb(255, 255, 255);">his pattern </span><span style="background-color: rgb(255, 255, 255);">raises some interesting questions regarding what we can expect in the rest of 2009: Will spam growth once again flatten or decline after a strong first quarter? Or have spammers &#8211; as part of their recovery from the McColo takedown</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">rebuilt botnets to be capable of sustaining or even accelerating this early growth spurt?</span></span> </div> <div><span style="font-size:100%;"><br /></span></div></div></div></div></div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">It's difficult to ascertain exactly how spammers have rebuilt in the wake of McColo, but data suggests they're adopting new strategies to avoid a McColo-type takedown from occurring again. Specifically, the recent upward trajectory of spam could indicate that spammers are building botnets that are more robust but send less volume</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">or at least that they haven't enabled their botnets to run at full capacity because they're wary of exposing a new ISP as a target.</span><span style="background-color: rgb(255, 255, 255);"> </span><br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>New types of spam</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most s<span style="background-color: rgb(255, 255, 255);">ignificant development in spam vectors this quarter was the appearance of location-based spam. </span><span style="background-color: rgb(255, 255, 255);">In this type of attack, users click on a link in a spam message and are directed to a page that contains a fraudulent news headline describing a crisis or disaster in a major city nearby.</span><span style="background-color: rgb(255, 255, 255);"> The </span>attack customizes the location for each user by determining the geolocation of the user's source IP and then identifying the nearest major city. The addition of location creates a heightened level of interest, and the user is tempted to click on the embedded video &#8211; which in turn downloads a virus to his or her machine.<br /></span></div><span style="font-size:100%;"><br /></span> <div><span style="font-size:100%;">Meanwhile, the economy, financial markets, job cuts, and resume help continue to be the most prominent topics spammers are employing as lures for more traditional attacks. We also saw increased spam activity around the U.S. presidential inauguration and St. Patrick's Day, in keeping with the recent propensity spammers have demonstrated for reading the news and keeping their eyes on the holiday calendar in targeting their attacks. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div> <div><span style="font-size:100%;"><b>Virus roundup</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">In early 2008, a trend emerged in which we saw spam messages with attached viruses (otherwise known as "payload viruses") spiking every Sunday, possibly targeting a maintenance window to catch corporate defenses when they were undergoing scheduled updates.<br /><br /></span></span> </div> <div style="text-align: center;"> <div id="pi9m"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_6hrk6z5gb_b" style="width: 501px; height: 342px;" /> </span></div></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />This year we've seen the payload viruses spread out across every day of the week, with no immediately obvious pattern in their distribution. It's difficult to say for certain what prompted the change, but one possible explanation is that spammers switched tactics because they weren't seeing the success they'd hoped for from the focused attacks.<br /><br /></span></span> <div id="zwuo" style="text-align: left;"><div style="text-align: center;"> </div><div id="gzup" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_8gx4khwgq_b" style="width: 501px; height: 343px;" /></span></div> </div></div></div> <div><span style="font-size:100%;"><i><span style="font-style: normal;"><br />Of course, p</span><span style="font-style: normal;">ayload v</span><span style="font-style: normal;">iruses have also seen a recent spike overall -- in the month of March we saw a 9x increase from February. This pales in comparison to the <a id="cq9z" title="highs we saw last summer" style="color: rgb(85, 26, 139);" href="http://googleenterprise.blogspot.com/2008/08/security-spotlight-july-virus-attacks.html">highs we saw last summer</a>, but it may indicate a developing trend that's worth keeping a close eye on. </span></i></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Viruses delivered as a blended threat (when a spam message directs a user to a malicious website, which then results in a virus being downloaded to the user's computer) continue to be popular with spammers. E-cards are one of the best examples of this vector, and Valentine's Day saw a flurry of activity using e-cards to direct users to malicious websites. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>Conclusions</b></span> </div></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Spammers continue to prove their resilience -- whether it's bouncing back from the biggest takedown on record or finding new ways to exploit the ways we communicate for malicious purposes, they're clearly here to stay. And Google believes firmly in the power of the cloud to protect your enterprise from them: Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your door. See how<span style="background-color: rgb(255, 255, 255);"> <a id="y8y0" title="much spam is costs your business" href="//www.google.com/postini/roi_calculator.html">much spam is costing your business</a>, learn</span> <a id="yx.c" title="how much you could be saving" href="//www.google.com/a/help/intl/en/security/tco_calculator.html">how much you could be saving</a> with Google Message Security, or <a id="vx86" title="contact our sales team" href="//www.google.com/support/appsecurity/bin/request.py?contact_type=sales">contact us</a> for more information. </span></div><span style="font-size:100%;"><br />Posted by Amanda Kleha, Google security and archiving team </span> </script> <noscript> <div><div><span style="font-size:100%;"><i><span style="background-color: rgb(255, 255, 255);">Editor's Note: The spam data cited in this post is drawn from the Google enterprise security and archiving security network (Postini), which delivers an added layer of security for standalone mail servers and Google Apps Premier Edition customers. For a discussion of the anti-spam measures included in Gmail, please <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">see this post from the Gmail blog. </a></span></i></span><i><span style="background-color: rgb(255, 255, 255);"><a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html"><br /></a></span></i></div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">In providing email security to more than 50,000 businesses and 15 million business users, Google security and archiving services, powered by <a id="knm_" title="Postini" href="//www.google.com/postini/">Postini</a>, process and cull spam from more than three billion enterprise email connections every day. This gives us strong insights into the state of the spam industry, some of which we share i<span style="background-color: rgb(255, 255, 255);">n </span><span style="background-color: rgb(255, 255, 255);"><span style="text-decoration: none;"><a id="sz2v" title="regular posts to this blog" href="http://googleenterprise.blogspot.com/search/label/spam%20and%20security%20trends">regular posts to this blog</a></span></span><span style="background-color: rgb(255, 255, 255);">.<br /><br />R</span>ead on for a quick overview of spam trends and events in the first quarter of 2009.<br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>What we saw in the Postini data centers</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most significant spam-related event in the first quarter of 2009 occurred when spam volume returned to <a id="r7x." title="pre-McColo takedown levels" href="http://googleenterprise.blogspot.com/2008/11/fighting-spam-just-got-little-easier.html">pre-McColo takedown levels</a>. By the second half of March, seven-day average spam volume was at the same volume we saw prior to <a id="y.sj" title="the blocking of ISP McColo in November 2008" href="http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html">the blocking of the McColo ISP in November 2008</a>.<br /><br /></span></div> <div><div style="text-align: center;"> </div><div id="e5gx" style="text-align: left;"><div style="text-align: center;"> </div><div id="esrn" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_102f833rgg_b" style="width: 500px; height: 343px;" /></span></div> </div></div> <div><span style="font-size:100%;"><br />Spammers have clearly rallied following the McColo takedown, and o<span style="background-color: rgb(255, 255, 255);">verall </span><span style="background-color: rgb(255, 255, 255);">spam</span><span style="background-color: rgb(255, 255, 255);"> volume growth during Q1 2009 was the strongest it's been</span> since early 2008, increasing an <span style="background-color: rgb(255, 255, 255);">average of </span><span style="background-color: rgb(255, 255, 255);">1.2% per day. To put that number into context, the growth rate of spam volume in Q1 2008 was <span style="background-color: rgb(255, 255, 255);">approximately 1% per day &#8211; which, at the time, was a record high.</span></span></span> </div> <div id="x636" style="text-align: left;"> <div> <div> <div id="x636" style="text-align: left;"> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">Of course, like every year before it,</span> 2008 set a new record for overall spam volume. But in 2008 spam growth flattened over the summer and early fall, and then fell off a cliff after the McColo takedown (daily growth declined to .8%, .3%, and then .01% in the last three quarters of the year). <span style="background-color: rgb(255, 255, 255);">T</span><span style="background-color: rgb(255, 255, 255);">his pattern </span><span style="background-color: rgb(255, 255, 255);">raises some interesting questions regarding what we can expect in the rest of 2009: Will spam growth once again flatten or decline after a strong first quarter? Or have spammers &#8211; as part of their recovery from the McColo takedown</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">rebuilt botnets to be capable of sustaining or even accelerating this early growth spurt?</span></span> </div> <div><span style="font-size:100%;"><br /></span></div></div></div></div></div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">It's difficult to ascertain exactly how spammers have rebuilt in the wake of McColo, but data suggests they're adopting new strategies to avoid a McColo-type takedown from occurring again. Specifically, the recent upward trajectory of spam could indicate that spammers are building botnets that are more robust but send less volume</span><span style="background-color: rgb(255, 255, 255);"> &#8211; </span><span style="background-color: rgb(255, 255, 255);">or at least that they haven't enabled their botnets to run at full capacity because they're wary of exposing a new ISP as a target.</span><span style="background-color: rgb(255, 255, 255);"> </span><br /></span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>New types of spam</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">The most s<span style="background-color: rgb(255, 255, 255);">ignificant development in spam vectors this quarter was the appearance of location-based spam. </span><span style="background-color: rgb(255, 255, 255);">In this type of attack, users click on a link in a spam message and are directed to a page that contains a fraudulent news headline describing a crisis or disaster in a major city nearby.</span><span style="background-color: rgb(255, 255, 255);"> The </span>attack customizes the location for each user by determining the geolocation of the user's source IP and then identifying the nearest major city. The addition of location creates a heightened level of interest, and the user is tempted to click on the embedded video &#8211; which in turn downloads a virus to his or her machine.<br /></span></div><span style="font-size:100%;"><br /></span> <div><span style="font-size:100%;">Meanwhile, the economy, financial markets, job cuts, and resume help continue to be the most prominent topics spammers are employing as lures for more traditional attacks. We also saw increased spam activity around the U.S. presidential inauguration and St. Patrick's Day, in keeping with the recent propensity spammers have demonstrated for reading the news and keeping their eyes on the holiday calendar in targeting their attacks. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div> <div><span style="font-size:100%;"><b>Virus roundup</b></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);">In early 2008, a trend emerged in which we saw spam messages with attached viruses (otherwise known as "payload viruses") spiking every Sunday, possibly targeting a maintenance window to catch corporate defenses when they were undergoing scheduled updates.<br /><br /></span></span> </div> <div style="text-align: center;"> <div id="pi9m"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_6hrk6z5gb_b" style="width: 501px; height: 342px;" /> </span></div></div> <div><span style="font-size:100%;"><span style="background-color: rgb(255, 255, 255);"><br />This year we've seen the payload viruses spread out across every day of the week, with no immediately obvious pattern in their distribution. It's difficult to say for certain what prompted the change, but one possible explanation is that spammers switched tactics because they weren't seeing the success they'd hoped for from the focused attacks.<br /><br /></span></span> <div id="zwuo" style="text-align: left;"><div style="text-align: center;"> </div><div id="gzup" style="text-align: left;"><div style="text-align: center;"><span style="font-size:100%;"><img src="https://docs.google.com/a/google.com/File?id=d68vshw_8gx4khwgq_b" style="width: 501px; height: 343px;" /></span></div> </div></div></div> <div><span style="font-size:100%;"><i><span style="font-style: normal;"><br />Of course, p</span><span style="font-style: normal;">ayload v</span><span style="font-style: normal;">iruses have also seen a recent spike overall -- in the month of March we saw a 9x increase from February. This pales in comparison to the <a id="cq9z" title="highs we saw last summer" style="color: rgb(85, 26, 139);" href="http://googleenterprise.blogspot.com/2008/08/security-spotlight-july-virus-attacks.html">highs we saw last summer</a>, but it may indicate a developing trend that's worth keeping a close eye on. </span></i></span> </div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Viruses delivered as a blended threat (when a spam message directs a user to a malicious website, which then results in a virus being downloaded to the user's computer) continue to be popular with spammers. E-cards are one of the best examples of this vector, and Valentine's Day saw a flurry of activity using e-cards to direct users to malicious websites. </span></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;"><b>Conclusions</b></span> </div></div> <div><span style="font-size:100%;"><br /></span></div> <div><span style="font-size:100%;">Spammers continue to prove their resilience -- whether it's bouncing back from the biggest takedown on record or finding new ways to exploit the ways we communicate for malicious purposes, they're clearly here to stay. And Google believes firmly in the power of the cloud to protect your enterprise from them: Outsourcing message security to Google enables you to leverage our technical expertise and massive infrastructure to keep spammers from your door. See how<span style="background-color: rgb(255, 255, 255);"> <a id="y8y0" title="much spam is costs your business" href="//www.google.com/postini/roi_calculator.html">much spam is costing your business</a>, learn</span> <a id="yx.c" title="how much you could be saving" href="//www.google.com/a/help/intl/en/security/tco_calculator.html">how much you could be saving</a> with Google Message Security, or <a id="vx86" title="contact our sales team" href="//www.google.com/support/appsecurity/bin/request.py?contact_type=sales">contact us</a> for more information. </span></div><span style="font-size:100%;"><br />Posted by Amanda Kleha, Google security and archiving team </span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Spam data and trends: Q1 2009&url=https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='3' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html' data-url='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/03/spam-data-and-trends-q1-2009.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/admin' rel='tag'> admin </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving' rel='tag'> Google Email Security and Archiving </a> , <a class='label' href='https://cloud.googleblog.com/search/label/IT' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='5628362765107420239' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2009/01/2008-year-in-spam.html' itemprop='url' title='2008: The year in spam'> 2008: The year in spam </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Monday, January 26, 2009 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style="font-style:italic;">[Ed. Note: The spam data cited in this post is drawn from the Postini Message Security network, which processes and culls spam from more than 2 billion enterprise email connections per day, giving Google strong insight into the state of the spam industry overall. For a discussion of what Google is doing to keep spam out of your Gmail inboxes on the consumer side, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">this post</a>.]</span><br /><br />In November 2008 a large source of the world's spam, the McColo network, was taken offline. Prior to that, spam levels had been holding relatively constant. But when McColo went offline, we saw spam drop by 70% compared with previous levels. However, spammers are recovering with vigor.<br /><br />While spam is still down overall, it's important to note its rate of growth. Spam levels are up by 156% since November 2008. As spammers recover, the increased rate of spam growth will likely have total spam volumes back to pre-McColo levels within a few months.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVe3WrNm6vp2UH-yT_wGuFaf6ZQXmTkXQS2zHiWxJ79DyRp_198O_sd6zODu-hWJcZokdP9l14z6XqyapJvgEF5xl0DKrEwR5Sg9Ow7v6ZAP9P93SiU0Ys6q394Vibdr86dZdSABGHa7pQ/s1600-h/blog0109_1b.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295614365294008034" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVe3WrNm6vp2UH-yT_wGuFaf6ZQXmTkXQS2zHiWxJ79DyRp_198O_sd6zODu-hWJcZokdP9l14z6XqyapJvgEF5xl0DKrEwR5Sg9Ow7v6ZAP9P93SiU0Ys6q394Vibdr86dZdSABGHa7pQ/s320/blog0109_1b.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" /></a><br /><br />Although McColo received a lot of attention, the highest volume of spam in 2008 actually came on April 23, which was an all-time high spam level for Google Message Security data centers. That day, the average number of spam messages blocked per user was 194. This peak was driven by an unprecedented number of non-delivery receipt (NDR) attacks we saw in April. One customer who was the target of a specific NDR attack said that their users were receiving an average of 100 emails every minute.<br /><br />As spammers fill the void left by McColo, it's reasonable to anticipate a decreasing rate of growth as spam reaches November 2008 levels. However, since the November levels weren't even the peak for the year, and since spammers appear to be quickly recovering, the question remains: Where will spam volume top out in 2009? Will it be near the November 2008 level? the April 2008 level? Or higher? <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh54K6EuAeL8IK9NFqjlltg_OOeuMMcAOJ9qodWw4yUJBJv-7bo2eF4uHoPkZk1OghkhvFI-cCRzDitlADdAL5GPByywX0QQBvMtDTquD8BQSvdegUy_hTpS3AxG5EwUp0Hcj_croBOrPbV/s1600-h/blog0109_3c.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295614834861067090" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh54K6EuAeL8IK9NFqjlltg_OOeuMMcAOJ9qodWw4yUJBJv-7bo2eF4uHoPkZk1OghkhvFI-cCRzDitlADdAL5GPByywX0QQBvMtDTquD8BQSvdegUy_hTpS3AxG5EwUp0Hcj_croBOrPbV/s320/blog0109_3c.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" /></a><br /><br />One way to approach that question might be to compare 2008 overall levels with previous years. Spam threats rose visibly in 2008, reflecting the overall trend of rising attacks. Even with the drop in November 2008, spam levels climbed 25% over 2007. Our statistics show that the average unprotected user would have received 45,000 spam messages in 2008 (up from 36,000 in 2007). All indicators suggest this trend will continue as virus, malware, and link-based attacks become both more frequent and more ingenious.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2fdK0EcHAzOKLdKWbaieWpKN0b33EGVBCu_zYBGCY5lCaKCClhPxIbGqqn-PpfUq0BEMMC1gH37WRNSZpqt9_nsw_fs-DBpnE3s5RpnPJBG5U_ozhPSH8Vo7YP66wnuW5ExQ1gpKttWFT/s1600-h/blog0109_2.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295615041237537506" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2fdK0EcHAzOKLdKWbaieWpKN0b33EGVBCu_zYBGCY5lCaKCClhPxIbGqqn-PpfUq0BEMMC1gH37WRNSZpqt9_nsw_fs-DBpnE3s5RpnPJBG5U_ozhPSH8Vo7YP66wnuW5ExQ1gpKttWFT/s320/blog0109_2.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" /></a><br /><br />Looking ahead to the rest of 2009, we expect viruses sent via email and in blended attacks (email and web) to continue to be a serious threat. During the second half of 2008, virus volume increased six-fold from the first half of the year. These spam messages would often try to fool users by mimicking legitimate emails such as package tracking notifications or invoices that included virus attachments. Another popular technique in 2008 was emailing spoofed news alerts with URLs that would link to a website hosting the virus. <br /><br />We can also expect that viruses and malware will continue to be a key tool and area of focus for spammers to upgrade their platforms. Even though virus attachment volumes have been low so far this year, we expect spammers to work hard to rebuild their networks to replace what was lost in the McColo shutdown. <br /><br />Of course, the only thing we can really say with certainty about 2009 is that spam and viruses will continue to be unpredictable. And given that uncertainty, virus detection and blocking technologies become even more important. Last year we released advanced new anti-virus heuristics that specifically targeted zero-hour vulnerability (the period of time between when a new virus enters the wild and the release of the anti-virus signature file). When the zero-hour protection identifies a suspicious message, the message is scanned using the new anti-virus heuristics, and if confirmed as a virus, the message is quarantined.<br /><br />The chart below is an example of our new heuristic virus detection and blocking at work. On October 1, 2008, our automated technology detected a viral message pattern (later identified as new strain of the Downloader-AAP!zip) in the wild and started quarantining messages with this virus. Five hours later we received the new virus signature file from one of our anti-virus partners and the signature-based blocks began to take effect. <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9KeptjpRZFkqt8EHHasnUYjnYaeqimspLyluK0nf96p58SdA5kLLoA59AbSM8__QbrTV3SegtDW6MIf0XHkpivHI6BMm-pxVy_G3kVKF6yA6PTWo0PPtndqIqKgsFUF-I8ERZ-wJbgpFA/s1600-h/Picture14.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295615418666825090" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9KeptjpRZFkqt8EHHasnUYjnYaeqimspLyluK0nf96p58SdA5kLLoA59AbSM8__QbrTV3SegtDW6MIf0XHkpivHI6BMm-pxVy_G3kVKF6yA6PTWo0PPtndqIqKgsFUF-I8ERZ-wJbgpFA/s320/Picture14.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 210px;" /></a><br /><br />As seen from the roller-coast ride of spam and viruses in 2008, spam has again demonstrated its resiliency. Despite eliminating a major source, spam keeps coming back. Spammers are re-investing with increasing speed to evolve their systems into decentralized, harder-to-detect ecosystems. If you'd like to know more about Google's anti-spam solution for businesses, visit us at www.google.com/a/security.<br /><br /><span class="byline-author">Posted by Amanda Kleha, Google Message Security Team</span> </script> <noscript> <span style="font-style:italic;">[Ed. Note: The spam data cited in this post is drawn from the Postini Message Security network, which processes and culls spam from more than 2 billion enterprise email connections per day, giving Google strong insight into the state of the spam industry overall. For a discussion of what Google is doing to keep spam out of your Gmail inboxes on the consumer side, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">this post</a>.]</span><br /><br />In November 2008 a large source of the world's spam, the McColo network, was taken offline. Prior to that, spam levels had been holding relatively constant. But when McColo went offline, we saw spam drop by 70% compared with previous levels. However, spammers are recovering with vigor.<br /><br />While spam is still down overall, it's important to note its rate of growth. Spam levels are up by 156% since November 2008. As spammers recover, the increased rate of spam growth will likely have total spam volumes back to pre-McColo levels within a few months.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVe3WrNm6vp2UH-yT_wGuFaf6ZQXmTkXQS2zHiWxJ79DyRp_198O_sd6zODu-hWJcZokdP9l14z6XqyapJvgEF5xl0DKrEwR5Sg9Ow7v6ZAP9P93SiU0Ys6q394Vibdr86dZdSABGHa7pQ/s1600-h/blog0109_1b.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295614365294008034" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVe3WrNm6vp2UH-yT_wGuFaf6ZQXmTkXQS2zHiWxJ79DyRp_198O_sd6zODu-hWJcZokdP9l14z6XqyapJvgEF5xl0DKrEwR5Sg9Ow7v6ZAP9P93SiU0Ys6q394Vibdr86dZdSABGHa7pQ/s320/blog0109_1b.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" /></a><br /><br />Although McColo received a lot of attention, the highest volume of spam in 2008 actually came on April 23, which was an all-time high spam level for Google Message Security data centers. That day, the average number of spam messages blocked per user was 194. This peak was driven by an unprecedented number of non-delivery receipt (NDR) attacks we saw in April. One customer who was the target of a specific NDR attack said that their users were receiving an average of 100 emails every minute.<br /><br />As spammers fill the void left by McColo, it's reasonable to anticipate a decreasing rate of growth as spam reaches November 2008 levels. However, since the November levels weren't even the peak for the year, and since spammers appear to be quickly recovering, the question remains: Where will spam volume top out in 2009? Will it be near the November 2008 level? the April 2008 level? Or higher? <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh54K6EuAeL8IK9NFqjlltg_OOeuMMcAOJ9qodWw4yUJBJv-7bo2eF4uHoPkZk1OghkhvFI-cCRzDitlADdAL5GPByywX0QQBvMtDTquD8BQSvdegUy_hTpS3AxG5EwUp0Hcj_croBOrPbV/s1600-h/blog0109_3c.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295614834861067090" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh54K6EuAeL8IK9NFqjlltg_OOeuMMcAOJ9qodWw4yUJBJv-7bo2eF4uHoPkZk1OghkhvFI-cCRzDitlADdAL5GPByywX0QQBvMtDTquD8BQSvdegUy_hTpS3AxG5EwUp0Hcj_croBOrPbV/s320/blog0109_3c.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" /></a><br /><br />One way to approach that question might be to compare 2008 overall levels with previous years. Spam threats rose visibly in 2008, reflecting the overall trend of rising attacks. Even with the drop in November 2008, spam levels climbed 25% over 2007. Our statistics show that the average unprotected user would have received 45,000 spam messages in 2008 (up from 36,000 in 2007). All indicators suggest this trend will continue as virus, malware, and link-based attacks become both more frequent and more ingenious.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2fdK0EcHAzOKLdKWbaieWpKN0b33EGVBCu_zYBGCY5lCaKCClhPxIbGqqn-PpfUq0BEMMC1gH37WRNSZpqt9_nsw_fs-DBpnE3s5RpnPJBG5U_ozhPSH8Vo7YP66wnuW5ExQ1gpKttWFT/s1600-h/blog0109_2.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295615041237537506" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2fdK0EcHAzOKLdKWbaieWpKN0b33EGVBCu_zYBGCY5lCaKCClhPxIbGqqn-PpfUq0BEMMC1gH37WRNSZpqt9_nsw_fs-DBpnE3s5RpnPJBG5U_ozhPSH8Vo7YP66wnuW5ExQ1gpKttWFT/s320/blog0109_2.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" /></a><br /><br />Looking ahead to the rest of 2009, we expect viruses sent via email and in blended attacks (email and web) to continue to be a serious threat. During the second half of 2008, virus volume increased six-fold from the first half of the year. These spam messages would often try to fool users by mimicking legitimate emails such as package tracking notifications or invoices that included virus attachments. Another popular technique in 2008 was emailing spoofed news alerts with URLs that would link to a website hosting the virus. <br /><br />We can also expect that viruses and malware will continue to be a key tool and area of focus for spammers to upgrade their platforms. Even though virus attachment volumes have been low so far this year, we expect spammers to work hard to rebuild their networks to replace what was lost in the McColo shutdown. <br /><br />Of course, the only thing we can really say with certainty about 2009 is that spam and viruses will continue to be unpredictable. And given that uncertainty, virus detection and blocking technologies become even more important. Last year we released advanced new anti-virus heuristics that specifically targeted zero-hour vulnerability (the period of time between when a new virus enters the wild and the release of the anti-virus signature file). When the zero-hour protection identifies a suspicious message, the message is scanned using the new anti-virus heuristics, and if confirmed as a virus, the message is quarantined.<br /><br />The chart below is an example of our new heuristic virus detection and blocking at work. On October 1, 2008, our automated technology detected a viral message pattern (later identified as new strain of the Downloader-AAP!zip) in the wild and started quarantining messages with this virus. Five hours later we received the new virus signature file from one of our anti-virus partners and the signature-based blocks began to take effect. <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9KeptjpRZFkqt8EHHasnUYjnYaeqimspLyluK0nf96p58SdA5kLLoA59AbSM8__QbrTV3SegtDW6MIf0XHkpivHI6BMm-pxVy_G3kVKF6yA6PTWo0PPtndqIqKgsFUF-I8ERZ-wJbgpFA/s1600-h/Picture14.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5295615418666825090" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9KeptjpRZFkqt8EHHasnUYjnYaeqimspLyluK0nf96p58SdA5kLLoA59AbSM8__QbrTV3SegtDW6MIf0XHkpivHI6BMm-pxVy_G3kVKF6yA6PTWo0PPtndqIqKgsFUF-I8ERZ-wJbgpFA/s320/Picture14.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 210px;" /></a><br /><br />As seen from the roller-coast ride of spam and viruses in 2008, spam has again demonstrated its resiliency. Despite eliminating a major source, spam keeps coming back. Spammers are re-investing with increasing speed to evolve their systems into decentralized, harder-to-detect ecosystems. If you'd like to know more about Google's anti-spam solution for businesses, visit us at www.google.com/a/security.<br /><br /><span class="byline-author">Posted by Amanda Kleha, Google Message Security Team</span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2009/01/2008-year-in-spam.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:2008: The year in spam&url=https://cloud.googleblog.com/2009/01/2008-year-in-spam.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2009/01/2008-year-in-spam.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='27' data-onclick='' data-post-url='https://cloud.googleblog.com/2009/01/2008-year-in-spam.html' data-url='https://cloud.googleblog.com/2009/01/2008-year-in-spam.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2009/01/2008-year-in-spam.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='1800974066457072920' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html' itemprop='url' title='Calculating the true cost of fighting spam'> Calculating the true cost of fighting spam </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Wednesday, November 19, 2008 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> In today's economic climate you need to be more efficient with your IT budget. And since email is a key tool for almost every businesses, keeping spam and malware out of inboxes remains a top priority. In our experience, companies often overlook the productivity costs that spam and viruses have on their business. This simple <a href="//www.google.com/a/help/intl/en/security/roi_calculator.html">ROI calculator</a> lets you see how much spam can impact expenses and productivity, particularly if your current anti-spam solution is waning in effectiveness.<br /><br />Once you quantify how much spam is costing your company, it makes sense to re-evaluate the IT options for managing spam. The first, and perhaps biggest, decision is whether to keep spam filtering in-house or use a hosted service. It can be difficult to add up the true expenses of each solution. On the surface, the cost of an appliance may seem reasonable, but the up-front costs are just the beginning in a complete cost-of-ownership calculation. <br /><br />At Google, we believe that email security makes sense as a hosted service for several cost-related reasons:<br /><br /> * <span style="font-weight:bold;">A cloud computing solution provides you with a predictable expense.</span> A spike in spam can hit at any time, and companies using an in-house solution may find themselves dealing with the unexpected capital expense of a new appliance to deal with the load. <br /><br /> * <span style="font-weight:bold;">You save on maintenance costs.</span> After installation, most in-house appliances require regular upgrades and maintenance. With a hosted solution, all the updates are handled through the cloud. Nothing to worry about or budget for.<br /><br /> * <span style="font-weight:bold;">Using the cloud makes email security more effective.</span> With a hosted service such as Google Message Security, you tap into a network of intelligence that spans more than 40,000 businesses and 14 million users, reaping the benefits of the economies of scale that come with that. <br /><br />To help you understand the whole cost of spam, we're introducing a <a href="//www.google.com/a/help/intl/en/security/tco_calculator.html">TCO (total cost of ownership) calculator</a>, which lets you compare expenses for in-house appliances versus hosted services. Using a three-year time horizon and considering both start-up and maintenance costs, companies can save thousands by choosing a hosted service. The graph below models the results of one cost scenario, for a 100-user company:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfW810g_Ys2y9rBbtiL5rx6JQNE4dtZ1Y08VmjvVEA-XT94Hy6WxVlAScFCabdNGLksPBkh0o8QKBF2V3mK8jZ51kDYqlN9UeVoFqhA0uckD0HbQ2krBfUx6xFlMctwY8H2MFR4zum-7x/s1600-h/tco_pic.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5270395515508531474" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfW810g_Ys2y9rBbtiL5rx6JQNE4dtZ1Y08VmjvVEA-XT94Hy6WxVlAScFCabdNGLksPBkh0o8QKBF2V3mK8jZ51kDYqlN9UeVoFqhA0uckD0HbQ2krBfUx6xFlMctwY8H2MFR4zum-7x/s320/tco_pic.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 210px;" /></a><br /><br />Let's look at a customer who was re-evaluating their spam solution last year: Gaines, Wolter, & Kinney, P.C. is a civil litigation firm in Birmingham, Alabama, that specializes in tort defense. They needed a solution that would reduce the inflow of network traffic and be cost effective. David Hebert, an IT administrator for GW&K, recalls, "Our limits on connection bandwidth meant that a service that filtered out spam was a no-brainer decision." But David needed data to convince management that a change was essential. He used a ROI calculator and found that they were losing 122 hours per employee in productivity each year to spam. With the hourly rate of their lawyers, this meant that choosing Google Message Security paid for itself in 1 day.<br /><br />If your business is interested in learning more about how hosted services like Google Message Security can save you money and increase productivity, visit us at <a href="//www.google.com/a/security">www.google.com/a/security</a>.<br /><br /><span class="byline-author">Posted by Amanda Kleha, Google Security and Compliance Team</span> </script> <noscript> In today's economic climate you need to be more efficient with your IT budget. And since email is a key tool for almost every businesses, keeping spam and malware out of inboxes remains a top priority. In our experience, companies often overlook the productivity costs that spam and viruses have on their business. This simple <a href="//www.google.com/a/help/intl/en/security/roi_calculator.html">ROI calculator</a> lets you see how much spam can impact expenses and productivity, particularly if your current anti-spam solution is waning in effectiveness.<br /><br />Once you quantify how much spam is costing your company, it makes sense to re-evaluate the IT options for managing spam. The first, and perhaps biggest, decision is whether to keep spam filtering in-house or use a hosted service. It can be difficult to add up the true expenses of each solution. On the surface, the cost of an appliance may seem reasonable, but the up-front costs are just the beginning in a complete cost-of-ownership calculation. <br /><br />At Google, we believe that email security makes sense as a hosted service for several cost-related reasons:<br /><br /> * <span style="font-weight:bold;">A cloud computing solution provides you with a predictable expense.</span> A spike in spam can hit at any time, and companies using an in-house solution may find themselves dealing with the unexpected capital expense of a new appliance to deal with the load. <br /><br /> * <span style="font-weight:bold;">You save on maintenance costs.</span> After installation, most in-house appliances require regular upgrades and maintenance. With a hosted solution, all the updates are handled through the cloud. Nothing to worry about or budget for.<br /><br /> * <span style="font-weight:bold;">Using the cloud makes email security more effective.</span> With a hosted service such as Google Message Security, you tap into a network of intelligence that spans more than 40,000 businesses and 14 million users, reaping the benefits of the economies of scale that come with that. <br /><br />To help you understand the whole cost of spam, we're introducing a <a href="//www.google.com/a/help/intl/en/security/tco_calculator.html">TCO (total cost of ownership) calculator</a>, which lets you compare expenses for in-house appliances versus hosted services. Using a three-year time horizon and considering both start-up and maintenance costs, companies can save thousands by choosing a hosted service. The graph below models the results of one cost scenario, for a 100-user company:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfW810g_Ys2y9rBbtiL5rx6JQNE4dtZ1Y08VmjvVEA-XT94Hy6WxVlAScFCabdNGLksPBkh0o8QKBF2V3mK8jZ51kDYqlN9UeVoFqhA0uckD0HbQ2krBfUx6xFlMctwY8H2MFR4zum-7x/s1600-h/tco_pic.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5270395515508531474" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfW810g_Ys2y9rBbtiL5rx6JQNE4dtZ1Y08VmjvVEA-XT94Hy6WxVlAScFCabdNGLksPBkh0o8QKBF2V3mK8jZ51kDYqlN9UeVoFqhA0uckD0HbQ2krBfUx6xFlMctwY8H2MFR4zum-7x/s320/tco_pic.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 210px;" /></a><br /><br />Let's look at a customer who was re-evaluating their spam solution last year: Gaines, Wolter, & Kinney, P.C. is a civil litigation firm in Birmingham, Alabama, that specializes in tort defense. They needed a solution that would reduce the inflow of network traffic and be cost effective. David Hebert, an IT administrator for GW&K, recalls, "Our limits on connection bandwidth meant that a service that filtered out spam was a no-brainer decision." But David needed data to convince management that a change was essential. He used a ROI calculator and found that they were losing 122 hours per employee in productivity each year to spam. With the hourly rate of their lawyers, this meant that choosing Google Message Security paid for itself in 1 day.<br /><br />If your business is interested in learning more about how hosted services like Google Message Security can save you money and increase productivity, visit us at <a href="//www.google.com/a/security">www.google.com/a/security</a>.<br /><br /><span class="byline-author">Posted by Amanda Kleha, Google Security and Compliance Team</span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Calculating the true cost of fighting spam&url=https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html' data-url='https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2008/11/calculating-true-cost-of-fighting-spam.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='3127634353765299568' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html' itemprop='url' title='Fighting spam just got a little easier'> Fighting spam just got a little easier </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Monday, November 17, 2008 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <i><span style="font-style: normal;">Last week, a web hosting service that was a significant source of spam was taken offline by the combined efforts of Security Fix and several Internet providers. Google would like to congratulate Security Fix for leading this effort and striking another blow in the battle to stamp out spam on the web. <span style="background-color: rgb(255, 255, 255);">The removal of this service helps "clean up" the web for everyone, and dovetails with efforts like Google's to make web communications safer and more secure in all of the ways that people use it. </span><br /><br />We<span style="color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);">'ll continue to monitor spam traffic, as we always do, but here's what</span> we've seen in the past few days:</span></i><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//4.bp.blogspot.com/_jSdgG4-DeNE/SSHpeUiDP_I/AAAAAAAAABg/o5GxL_C4okI/s1600-h/Spam+Volume+Trend.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5269749746117066738" src="//4.bp.blogspot.com/_jSdgG4-DeNE/SSHpeUiDP_I/AAAAAAAAABg/o5GxL_C4okI/s320/Spam+Volume+Trend.png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 207px;"></a><span style="font-style: normal;"><br />On November 11, when the spam source was taken down, we saw a 70% drop in spam from levels seen at the beginning of the month. However, we've seen drops like this before. In late July this year there was a similar drop that was reversed within a few days.</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_jSdgG4-DeNE/SSHprROcgqI/AAAAAAAAABo/nDIzN9FmBOk/s1600-h/Spam+Trend+08.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5269749968567829154" src="//1.bp.blogspot.com/_jSdgG4-DeNE/SSHprROcgqI/AAAAAAAAABo/nDIzN9FmBOk/s320/Spam+Trend+08.png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 208px;"></a><br /><div style="text-align: center;"> <i> </i> </div>Gmail servers, which also noticed a drop in spam on November 11, are now showing an upward trend as new sources of spam, as always, continue to emerge.<br /><span style="background-color: rgb(255, 255, 255);">The team at Google stays "on guard" as the fight continues!<br /><br /></span><span class="byline-author">Posted by Amanda Kleha, Google Security and Compliance Team</span> </script> <noscript> <i><span style="font-style: normal;">Last week, a web hosting service that was a significant source of spam was taken offline by the combined efforts of Security Fix and several Internet providers. Google would like to congratulate Security Fix for leading this effort and striking another blow in the battle to stamp out spam on the web. <span style="background-color: rgb(255, 255, 255);">The removal of this service helps "clean up" the web for everyone, and dovetails with efforts like Google's to make web communications safer and more secure in all of the ways that people use it. </span><br /><br />We<span style="color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);">'ll continue to monitor spam traffic, as we always do, but here's what</span> we've seen in the past few days:</span></i><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//4.bp.blogspot.com/_jSdgG4-DeNE/SSHpeUiDP_I/AAAAAAAAABg/o5GxL_C4okI/s1600-h/Spam+Volume+Trend.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5269749746117066738" src="//4.bp.blogspot.com/_jSdgG4-DeNE/SSHpeUiDP_I/AAAAAAAAABg/o5GxL_C4okI/s320/Spam+Volume+Trend.png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 207px;"></a><span style="font-style: normal;"><br />On November 11, when the spam source was taken down, we saw a 70% drop in spam from levels seen at the beginning of the month. However, we've seen drops like this before. In late July this year there was a similar drop that was reversed within a few days.</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="//1.bp.blogspot.com/_jSdgG4-DeNE/SSHprROcgqI/AAAAAAAAABo/nDIzN9FmBOk/s1600-h/Spam+Trend+08.png"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5269749968567829154" src="//1.bp.blogspot.com/_jSdgG4-DeNE/SSHprROcgqI/AAAAAAAAABo/nDIzN9FmBOk/s320/Spam+Trend+08.png" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 208px;"></a><br /><div style="text-align: center;"> <i> </i> </div>Gmail servers, which also noticed a drop in spam on November 11, are now showing an upward trend as new sources of spam, as always, continue to emerge.<br /><span style="background-color: rgb(255, 255, 255);">The team at Google stays "on guard" as the fight continues!<br /><br /></span><span class="byline-author">Posted by Amanda Kleha, Google Security and Compliance Team</span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Fighting spam just got a little easier&url=https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='4' data-onclick='' data-post-url='https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html' data-url='https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2008/11/fighting-spam-just-got-little-easier.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/IT' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='286508749983534197' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html' itemprop='url' title='Google Positioned in Leaders Quadrant'> Google Positioned in Leaders Quadrant </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Tuesday, September 30, 2008 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style=";font-family:arial;font-size:100%;" id="un9d" >In their </span><span style=";font-family:arial;font-size:100%;" id="nlco" >recently released </span><span style=";font-family:arial;font-size:100%;" id="nlco0" ><a title="Access the report, complements of Google" href="//www.google.com/support/a/bin/request.py?contact_type=quadrant" id="mr3_">Magic Quadrant for Email Security Boundaries</a> (published September 11, 2008), </span><span style=";font-family:arial;font-size:100%;" id="un9d" >Gartner Inc., an information technology research and advisory company, placed <a id="i-tg" href="//www.google.com/a/security" title="Google email security products">Google</a> in the "Leaders Quadrant</span><span style=";font-family:arial;font-size:100%;" id="nlco0" >." </span><span style=";font-family:arial;font-size:100%;" id="y3-5" >Quadrant leaders, as Gartner defines them, are "performing well today, have a clear vision of market direction, and are actively building competencies to sustain their leadership position in the market." Quadrant leaders also "offer a comprehensive and proficient range of email security functionality, and show evidence of superior vision and execution for current and anticipated customer requirements. </span><span style=";font-family:arial;font-size:100%;" ><br /><br />Leaders typically have relatively high market share and/or strong revenue growth, own a good portion of their threat or content-filtering capabilities, and demonstrate positive customer feedback for anti-spam efficacy, and related service and support.</span><span style=";font-family:arial;font-size:100%;" id="y3-5" >"</span><span style=";font-family:arial;font-size:100%;" id="u2-1" > </span><span style=";font-family:Arial;font-size:100%;" ><span id="aj:i">The report goes on to say that "T</span><span id="rswu">he email security market is rapidly maturing, yet continues to show strong growth and remains a 'must have' security purchase." </span><br /></span> <div style="margin-top: 0px; margin-bottom: 0px;font-family:arial;"><span id="aj:i1" style="font-size:100%;"><br />We're pleased to be included in this report and recognized in the leaders quadrant, as it underlines, in our opinion, the importance we attach to protecting against email-based threats and the ways we're helping our customers do so. <span id="aj:i1">Since the integration of the Postini email security product line in 2007 into Google's Enterprise Apps, Google has continued to innovate these products with functionality for our customers, including a new early detection quarantine that uses our own <span style="border-collapse: collapse;">heuristics to detect new virus strains before virus signatures are available. We have also added <span style="border-collapse: separate;">new content filter types, policy prioritization for messages that trigger more than one policy, and new policy engine interface features. </span></span></span></span></div> <div style="margin-top: 0px; margin-bottom: 0px;"><span style="font-family:Arial;"><br /></span><span id="aj:i1" style="font-size:85%;"><span style="font-family:Arial;"></span></span></div><span style="font-style: italic;font-size:78%;" ><span style="font-family:Arial;"><span style="font-family:Verdana;"><span style="font-family:Arial;">The Gartner Magic Quadrant is copyrighted 2008 by Gartner, Inc., and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner&#8217;s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</span></span></span></span><br /><br /><span class="byline-author"><span style="font-size:100%;">Posted by Adam Swidler, Google Enterprise Product Marketing</span><br /></span> </script> <noscript> <span style=";font-family:arial;font-size:100%;" id="un9d" >In their </span><span style=";font-family:arial;font-size:100%;" id="nlco" >recently released </span><span style=";font-family:arial;font-size:100%;" id="nlco0" ><a title="Access the report, complements of Google" href="//www.google.com/support/a/bin/request.py?contact_type=quadrant" id="mr3_">Magic Quadrant for Email Security Boundaries</a> (published September 11, 2008), </span><span style=";font-family:arial;font-size:100%;" id="un9d" >Gartner Inc., an information technology research and advisory company, placed <a id="i-tg" href="//www.google.com/a/security" title="Google email security products">Google</a> in the "Leaders Quadrant</span><span style=";font-family:arial;font-size:100%;" id="nlco0" >." </span><span style=";font-family:arial;font-size:100%;" id="y3-5" >Quadrant leaders, as Gartner defines them, are "performing well today, have a clear vision of market direction, and are actively building competencies to sustain their leadership position in the market." Quadrant leaders also "offer a comprehensive and proficient range of email security functionality, and show evidence of superior vision and execution for current and anticipated customer requirements. </span><span style=";font-family:arial;font-size:100%;" ><br /><br />Leaders typically have relatively high market share and/or strong revenue growth, own a good portion of their threat or content-filtering capabilities, and demonstrate positive customer feedback for anti-spam efficacy, and related service and support.</span><span style=";font-family:arial;font-size:100%;" id="y3-5" >"</span><span style=";font-family:arial;font-size:100%;" id="u2-1" > </span><span style=";font-family:Arial;font-size:100%;" ><span id="aj:i">The report goes on to say that "T</span><span id="rswu">he email security market is rapidly maturing, yet continues to show strong growth and remains a 'must have' security purchase." </span><br /></span> <div style="margin-top: 0px; margin-bottom: 0px;font-family:arial;"><span id="aj:i1" style="font-size:100%;"><br />We're pleased to be included in this report and recognized in the leaders quadrant, as it underlines, in our opinion, the importance we attach to protecting against email-based threats and the ways we're helping our customers do so. <span id="aj:i1">Since the integration of the Postini email security product line in 2007 into Google's Enterprise Apps, Google has continued to innovate these products with functionality for our customers, including a new early detection quarantine that uses our own <span style="border-collapse: collapse;">heuristics to detect new virus strains before virus signatures are available. We have also added <span style="border-collapse: separate;">new content filter types, policy prioritization for messages that trigger more than one policy, and new policy engine interface features. </span></span></span></span></div> <div style="margin-top: 0px; margin-bottom: 0px;"><span style="font-family:Arial;"><br /></span><span id="aj:i1" style="font-size:85%;"><span style="font-family:Arial;"></span></span></div><span style="font-style: italic;font-size:78%;" ><span style="font-family:Arial;"><span style="font-family:Verdana;"><span style="font-family:Arial;">The Gartner Magic Quadrant is copyrighted 2008 by Gartner, Inc., and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner&#8217;s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</span></span></span></span><br /><br /><span class="byline-author"><span style="font-size:100%;">Posted by Adam Swidler, Google Enterprise Product Marketing</span><br /></span> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Google Positioned in Leaders Quadrant&url=https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='1' data-onclick='' data-post-url='https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html' data-url='https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2008/09/google-positioned-in-leaders-quadrant.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='post' data-id='8865370982940430836' itemscope='' itemtype='http://schema.org/BlogPosting'> <h2 class='title' itemprop='name'> <a href='https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html' itemprop='url' title='Security Spotlight: July Virus Attacks'> Security Spotlight: July Virus Attacks </a> </h2> <div class='post-header'> <div class='published'> <span class='publishdate' itemprop='datePublished'> Tuesday, August 12, 2008 </span> </div> </div> <div class='post-body'> <div class='post-content' itemprop='articleBody'> <script type='text/template'> <span style=";font-family:verdana;font-size:85%;" class="byline-author" >Posted by Amanda Kleha, Google Apps Security &amp; Compliance Team<br /><br /></span><span style="font-size:85%;"><span id="o.od0" style="font-family:verdana;"><span id="g1ex" style="background-color: rgb(255, 255, 255);">In July, our </span><span id="tw28" style="background-color: rgb(255, 255, 255);">Postini </span><span id="g1ex0" style="background-color: rgb(255, 255, 255);">datacenters </span>saw the biggest volume of email virus attacks so far in 2008, with a peak of nearly 10 million messages on July 24. </span><span id="momr" style="font-family:verdana;">One of the more prominent attacks in the month involved </span><span id="ghd-" style="font-family:verdana;">a spoofed UPS package-tracking link that was intended to lure recipients into clicking on it and downloading malware. </span><span id="ghd-0" style="font-family:verdana;">Our zero-hour virus protection technology first started catching these emails on July 20.<br /><br /></span></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRlwN1dDiapXAXafp4OzgvXjV0ph3iwuLfm4v6y4A3kO1msbHHCXCYwP6d7z9_ICVfH0VqK6ITJX6y-f0Q9Tq70pTNH6IFFKkBl278G4bEOxPB7jvoow6qkSyAxlNGwVfyhE-K2UtFS6e5/s1600-h/chart_virus-activity(2).jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5233723025753595730" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRlwN1dDiapXAXafp4OzgvXjV0ph3iwuLfm4v6y4A3kO1msbHHCXCYwP6d7z9_ICVfH0VqK6ITJX6y-f0Q9Tq70pTNH6IFFKkBl278G4bEOxPB7jvoow6qkSyAxlNGwVfyhE-K2UtFS6e5/s320/chart_virus-activity(2).jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" /></a><br /><span style="font-size:85%;"><span id="ghd-0" style="font-family:verdana;"><br /></span><span id="ikzo" style="font-family:verdana;">Many of the viruses we see follow a similar format, in which an email with an embedded website link in the message is changed from what the link displays. <span id="r4c5" style="background-color: rgb(255, 255, 255);">Another recent example was a </span></span><span id="r4c50" style="background-color: rgb(255, 255, 255);font-family:verdana;" >spoofed CNN newsletter sent out by spammers. In this case, the content included current news stories with numerous links in the message. The majority of the links were valid, but there were some that were replaced with malicious links. As soon as our technology started detecting these messages, we implemented a filter to stop these elusive viruses and voila! -- all of our 14 million business users were protected. </span><span id="qmuo" style="font-family:verdana;">This network effect and rapid protection against these new tactics is why businesses are increasingly moving their email security into the cloud.</span> <span style="font-family:verdana;"><br /><br />Viruses tend to increase during the summer months, and August is already showing some new types of viruses. On August 5, we saw a large inflow of messages with an encrypted .RAR attachment. The overall 2008 trend has been a decrease in the use of attachments, so this new virus is confirmation that spam doesn't follow trends for long.</span> </span><div id="tjmh" style="padding: 1em 0pt; text-align: left;"><span style="font-size:85%;"><span style="font-family:verdana;">These examples are also a good reminder about the importance of educating our colleagues, friends, and family on how to safely interact with email -- namely, that we should all </span><a style="font-family: verdana;" title="be careful" href="http://googleblog.blogspot.com/2008/04/how-to-avoid-getting-hooked.html" id="sd8k">be careful</a><span style="font-family:verdana;"> about clicking on links in emails, even if those messages appear to be from people or organizations we know.</span><br /><br /><span id="f8-7" style="font-family:verdana;"><a style="font-weight: bold;" title="Join Google security experts" href="http://w.on24.com/r.htm?e=116483&amp;s=1&amp;k=E679E434ECD09EFE9AB299E6B4E16A3B&amp;partnerref=blog_enterprise" id="y5.z">Join Google security experts</a> for an upcoming webinar for IT professionals that will explore the topic "How spam is changing your business email, and what to do about it" on Friday, August 15, at 10:00 am PDT.<br /><br />For more information on how Google can help your business secure its email and web traffic, visit us at www.google.com/a/security.</span></span><br /></div> </script> <noscript> <span style=";font-family:verdana;font-size:85%;" class="byline-author" >Posted by Amanda Kleha, Google Apps Security &amp; Compliance Team<br /><br /></span><span style="font-size:85%;"><span id="o.od0" style="font-family:verdana;"><span id="g1ex" style="background-color: rgb(255, 255, 255);">In July, our </span><span id="tw28" style="background-color: rgb(255, 255, 255);">Postini </span><span id="g1ex0" style="background-color: rgb(255, 255, 255);">datacenters </span>saw the biggest volume of email virus attacks so far in 2008, with a peak of nearly 10 million messages on July 24. </span><span id="momr" style="font-family:verdana;">One of the more prominent attacks in the month involved </span><span id="ghd-" style="font-family:verdana;">a spoofed UPS package-tracking link that was intended to lure recipients into clicking on it and downloading malware. </span><span id="ghd-0" style="font-family:verdana;">Our zero-hour virus protection technology first started catching these emails on July 20.<br /><br /></span></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRlwN1dDiapXAXafp4OzgvXjV0ph3iwuLfm4v6y4A3kO1msbHHCXCYwP6d7z9_ICVfH0VqK6ITJX6y-f0Q9Tq70pTNH6IFFKkBl278G4bEOxPB7jvoow6qkSyAxlNGwVfyhE-K2UtFS6e5/s1600-h/chart_virus-activity(2).jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5233723025753595730" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRlwN1dDiapXAXafp4OzgvXjV0ph3iwuLfm4v6y4A3kO1msbHHCXCYwP6d7z9_ICVfH0VqK6ITJX6y-f0Q9Tq70pTNH6IFFKkBl278G4bEOxPB7jvoow6qkSyAxlNGwVfyhE-K2UtFS6e5/s320/chart_virus-activity(2).jpg" style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" /></a><br /><span style="font-size:85%;"><span id="ghd-0" style="font-family:verdana;"><br /></span><span id="ikzo" style="font-family:verdana;">Many of the viruses we see follow a similar format, in which an email with an embedded website link in the message is changed from what the link displays. <span id="r4c5" style="background-color: rgb(255, 255, 255);">Another recent example was a </span></span><span id="r4c50" style="background-color: rgb(255, 255, 255);font-family:verdana;" >spoofed CNN newsletter sent out by spammers. In this case, the content included current news stories with numerous links in the message. The majority of the links were valid, but there were some that were replaced with malicious links. As soon as our technology started detecting these messages, we implemented a filter to stop these elusive viruses and voila! -- all of our 14 million business users were protected. </span><span id="qmuo" style="font-family:verdana;">This network effect and rapid protection against these new tactics is why businesses are increasingly moving their email security into the cloud.</span> <span style="font-family:verdana;"><br /><br />Viruses tend to increase during the summer months, and August is already showing some new types of viruses. On August 5, we saw a large inflow of messages with an encrypted .RAR attachment. The overall 2008 trend has been a decrease in the use of attachments, so this new virus is confirmation that spam doesn't follow trends for long.</span> </span><div id="tjmh" style="padding: 1em 0pt; text-align: left;"><span style="font-size:85%;"><span style="font-family:verdana;">These examples are also a good reminder about the importance of educating our colleagues, friends, and family on how to safely interact with email -- namely, that we should all </span><a style="font-family: verdana;" title="be careful" href="http://googleblog.blogspot.com/2008/04/how-to-avoid-getting-hooked.html" id="sd8k">be careful</a><span style="font-family:verdana;"> about clicking on links in emails, even if those messages appear to be from people or organizations we know.</span><br /><br /><span id="f8-7" style="font-family:verdana;"><a style="font-weight: bold;" title="Join Google security experts" href="http://w.on24.com/r.htm?e=116483&amp;s=1&amp;k=E679E434ECD09EFE9AB299E6B4E16A3B&amp;partnerref=blog_enterprise" id="y5.z">Join Google security experts</a> for an upcoming webinar for IT professionals that will explore the topic "How spam is changing your business email, and what to do about it" on Friday, August 15, at 10:00 am PDT.<br /><br />For more information on how Google can help your business secure its email and web traffic, visit us at www.google.com/a/security.</span></span><br /></div> </noscript> </div> </div> <div class='share'> <span class='gplus-share social-wrapper' data-href='https://plus.google.com/share?url=https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html'> <img alt='Share on Google+' height='24' src='https://www.gstatic.com/images/branding/google_plus/2x/ic_w_post_gplus_black_24dp.png' width='24'/> </span> <span class='twitter-custom social-wrapper' data-href='http://twitter.com/share?text=Official Google Cloud Blog:Security Spotlight: July Virus Attacks&url=https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html&via=gsuite'> <img alt='Share on Twitter' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_twitter_black_24dp.png' width='24'/> </span> <span class='fb-custom social-wrapper' data-href='https://www.facebook.com/sharer.php?u=https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html'> <img alt='Share on Facebook' height='24' src='https://www.gstatic.com/images/icons/material/system/2x/post_facebook_black_24dp.png' width='24'/> </span> </div> <div class='comment-container'> <i class='comment-img material-icons'> &#57529; </i> <span class='cmt_count_iframe_holder' data-count='0' data-onclick='' data-post-url='https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html' data-url='https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html' style='color: #4184F3;'></span> </div> <div class='post-footer'> <div class='cmt_iframe_holder' data-href='https://cloud.googleblog.com/2008/08/security-spotlight-july-virus-attacks.html' data-viewtype='FILTERED_POSTMOD'></div> <a href='https://plus.google.com/112374322230920073195' rel='author' style='display:none;'> Google </a> <div class='label-footer'> <span class='labels-caption'> Labels: </span> <span class='labels'> <a class='label' href='https://cloud.googleblog.com/search/label/IT' rel='tag'> IT </a> , <a class='label' href='https://cloud.googleblog.com/search/label/Postini' rel='tag'> Postini </a> , <a class='label' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends' rel='tag'> spam and security trends </a> </span> </div> </div> </div> <div class='blog-pager' id='blog-pager'> <a class='home-link' href='https://cloud.googleblog.com/'> <i class='material-icons'> &#59530; </i> </a> <i class='material-icons disabled'> &#58820; </i> <span id='blog-pager-older-link'> <a class='blog-pager-older-link' href='https://cloud.googleblog.com/search/label/spam%20and%20security%20trends?updated-max=2008-08-12T12:53:00-07:00&max-results=20&start=20&by-date=false' id='Blog1_blog-pager-older-link' title='Older Posts'> <i class='material-icons'> &#58824; </i> </a> </span> </div> <div class='clear'></div> </div></div> </div> </div> <div class='col-right'> <div class='section' id='sidebar-top'><div class='widget HTML' data-version='1' id='HTML8'> <div class='widget-content'> <div class='searchBox'> <input type='text' title='Search This Blog' placeholder='Search blog ...' /> </div> </div> <div class='clear'></div> </div></div> <div id='aside'> <div class='section' id='sidebar'><div class='widget Label' data-version='1' id='Label1'> <div class='tab'> <img class='sidebar-icon' src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAYAAABXAvmHAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAAYpJREFUeNrs2aFuwzAQBmAvKRkMKRjZA4QMDJaWFgyMjuzFRg37DIUlA3uFkoGQSaWzJU+tpri5O9+l/zSfdFJlpe59yTmyVedq1PjfcZMZ70NuQnaF8w8htyE/rABtpviXkLcK88c5HhLkMBfgVan43zfFBNGMjHVGT/s55KP2pAvidbGHd+nzKt1RKSLG3rKF1iPFv6UWiPke8i7kEqGdGsI1O+LYVdqJAjgirwkKYD0ytkJBUNbAMvX8V3q9PhUsYvU1sWD8SO/sQvx2ahxOiNoJCSBCoAHYCEQAC4EKICOQASQEOmAS8RcAFxFN5hiIiugpgC3wk9hQAHH/70EBHXUN7IER5EWMiBgo2+nzOKQv9SCAeEM/OQAkhE/ncccFICB87qzQMia5FsJfOui0zMnmRvipU1ormHQuxGTxUsAcCFLxJQBLBLn4UoAFglW8BkATwS5eC6CBEBWvCShBiIvXBkgQRcVbADiI4uKtABSESvGWgB9EzHt3+tNwyO0qa9SoIYtvAQYAqDJhaWWeMecAAAAASUVORK5CYII='/> <h2> Labels </h2> <i class='material-icons arrow'> &#58821; </i> </div> <div class='widget-content list-label-widget-content'> <ul> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23innovationupgrade'> #innovationupgrade </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23InspireGirls'> #InspireGirls </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23moregoogleapps'> #moregoogleapps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23SysAdminDay'> #SysAdminDay </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23tbt'> #tbt </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23throwbackthursday'> #throwbackthursday </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/%23top10trust'> #top10trust </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/100%25%20web'> 100% web </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/50states'> 50states </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/ad%20contest'> ad contest </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/add-ons'> add-ons </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/admin'> admin </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Admin%20console'> Admin console </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/admin%20sdk'> admin sdk </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/AirPlay'> AirPlay </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android'> Android </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20for%20Work'> Android for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20for%20Work%20Live'> Android for Work Live </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20Marshmellow'> Android Marshmellow </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20Nougat'> Android Nougat </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20security'> Android security </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Android%20security%20tips'> Android security tips </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Apps%20Adventures'> Apps Adventures </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/apps%20script'> apps script </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/apptuesday'> apptuesday </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Armed%20Forces%20Day'> Armed Forces Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Asia%20Pacific'> Asia Pacific </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Atmosphere%20Live'> Atmosphere Live </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Audi'> Audi </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Audi%20Connect'> Audi Connect </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/audit'> audit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Australia'> Australia </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/big%20data'> big data </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Big%20Query'> Big Query </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/bigquery'> bigquery </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Boston'> Boston </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/browser'> browser </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chomebox%20for%20Meetings'> Chomebox for Meetings </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome'> Chrome </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20Device%20Management'> Chrome Device Management </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20digital%20signage'> Chrome digital signage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20for%20Business'> Chrome for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20for%20Work'> Chrome for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20Frame'> Chrome Frame </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chrome%20OS'> Chrome OS </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebit'> Chromebit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks'> Chromebooks </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks%20for%20Business'> Chromebooks for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks%20for%20Education'> Chromebooks for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebooks%20for%20Work'> Chromebooks for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebox%20for%20digital%20signage'> Chromebox for digital signage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebox%20for%20meetings'> Chromebox for meetings </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromebox%20for%20signage'> Chromebox for signage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromeboxes'> Chromeboxes </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Chromecast'> Chromecast </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/City%2024%2F7'> City 24/7 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Classroom'> Classroom </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Clearing%20Kosovo'> Clearing Kosovo </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Cloud'> Cloud </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing'> cloud computing </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle'> cloud computing gonegoogle </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle%20Google%20Apps'> cloud computing gonegoogle Google Apps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle%20Google%20Apps%20google%20docs%20small%20business%20success%20story'> cloud computing gonegoogle Google Apps google docs small business success story </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20computing%20gonegoogle%20Google%20Apps%20google%20docs%20small%20business%20success%20story%20switch'> cloud computing gonegoogle Google Apps google docs small business success story switch </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20datastore'> cloud datastore </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20platform'> cloud platform </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Cloud%20Platform%20Live'> Cloud Platform Live </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20print'> cloud print </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20series'> cloud series </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20services'> cloud services </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/cloud%20sql'> cloud sql </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/collaboration'> collaboration </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Colorado'> Colorado </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Connectors'> Connectors </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/contacts'> contacts </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Control%20Panel'> Control Panel </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/customer'> customer </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/customer%20love'> customer love </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Customer%20story'> Customer story </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Customer%20support'> Customer support </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Customer%20testimonial'> Customer testimonial </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/data%20centers'> data centers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/data%20processing%20amendment'> data processing amendment </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/data%20protection'> data protection </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Developer'> Developer </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/developers'> developers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Digital%20Learning%20Day'> Digital Learning Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Docs'> Docs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/documents'> documents </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/DPA'> DPA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Drawings'> Drawings </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Drive%20for%20Education'> Drive for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/drive%20sharing'> drive sharing </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Earth'> Earth </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/earth%20and%20maps'> earth and maps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EC'> EC </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/education'> education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Education%20on%20Air'> Education on Air </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EMC'> EMC </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EMM'> EMM </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Energy'> Energy </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/enterprise'> enterprise </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/EU'> EU </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/events'> events </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/FedEx'> FedEx </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Fedex.com'> Fedex.com </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Finance'> Finance </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Firebase'> Firebase </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Forms'> Forms </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/franchises'> franchises </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GAFE'> GAFE </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Gartner'> Gartner </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GE'> GE </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/geo'> geo </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Global%20Partner%20Summit'> Global Partner Summit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/gmail'> gmail </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Gone%20Google'> Gone Google </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/gonegoogle'> gonegoogle </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20AdWords'> Google AdWords </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20App%20Engine'> Google App Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps'> Google Apps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Blog'> Google Apps Blog </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Business'> Google Apps for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Education'> Google Apps for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Government'> Google Apps for Government </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20for%20Work'> Google Apps for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Marketplace'> Google Apps Marketplace </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Reseller'> Google Apps Reseller </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Script'> Google Apps Script </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Apps%20Vault'> Google Apps Vault </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20BigQuery'> Google BigQuery </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Calendar'> Google Calendar </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Calendar%20app'> Google Calendar app </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Certified%20Teachers'> Google Certified Teachers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Chrome'> Google Chrome </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Chromebases'> Google Chromebases </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Classroom'> Google Classroom </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20Datastore'> Google Cloud Datastore </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20DNS'> Google Cloud DNS </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20Platform'> Google Cloud Platform </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20cloud%20storage'> google cloud storage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Cloud%20Vision%20API'> Google Cloud Vision API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20commerce%20search'> google commerce search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Compute%20Engine'> Google Compute Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Doc'> Google Doc </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Docs'> Google Docs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Domains'> Google Domains </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Draw'> Google Draw </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Drive'> Google Drive </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Drive%20for%20Work'> Google Drive for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth'> Google Earth </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Engine'> Google Earth Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Enterprise'> Google Earth Enterprise </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Images'> Google Earth Images </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Earth%20Pro'> Google Earth Pro </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Email%20Security%20and%20Archiving'> Google Email Security and Archiving </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Enterprise'> Google Enterprise </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Enterprise%20Search'> Google Enterprise Search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Expeditions'> Google Expeditions </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Education'> Google for Education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Education%20Partner%20Program'> Google for Education Partner Program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Education%20Training%20Center'> Google for Education Training Center </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Entrepreneurs'> Google for Entrepreneurs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Work'> Google for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Work%20and%20Google%20for%20Education%20Partner%20Program'> Google for Work and Google for Education Partner Program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20for%20Work%20partner%20program'> Google for Work partner program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Forms'> Google Forms </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Green'> Google Green </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20groups'> google groups </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Hangout'> Google Hangout </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Hangouts'> Google Hangouts </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20I%2FO'> Google I/O </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Keep'> Google Keep </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps'> Google Maps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20API'> Google Maps API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20APIs'> Google Maps APIs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Coordinate'> Google Maps Coordinate </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Engine'> Google Maps Engine </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Engine%20Pro'> Google Maps Engine Pro </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Engine%20public%20data%20program'> Google Maps Engine public data program </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20for%20Business'> Google Maps for Business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20for%20Work'> Google Maps for Work </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Gallery'> Google Maps Gallery </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Maps%20Tracks%20API'> Google Maps Tracks API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Message%20Continuity'> Google Message Continuity </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20message%20security'> google message security </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Mobile%20Device%20Management'> Google Mobile Device Management </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20My%20Maps'> Google My Maps </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20My%20Maps%20Pro'> Google My Maps Pro </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Places%20API'> Google Places API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Play'> Google Play </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20play%20for%20education'> google play for education </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Prediction%20API'> Google Prediction API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Research%20tool'> Google Research tool </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Science%20Fair'> Google Science Fair </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Search%20Appliance'> Google Search Appliance </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Security%20Key'> Google Security Key </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Sheets'> Google Sheets </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Site%20Search'> Google Site Search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20sites'> google sites </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Slides%20API'> Google Slides API </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Smart%20Lock'> Google Smart Lock </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20spreadsheets'> Google spreadsheets </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Springboard'> Google Springboard </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%20storage'> google storage </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Storage%20for%20Developers'> Google Storage for Developers </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Translate'> Google Translate </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Vault'> Google Vault </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Video'> Google Video </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%20Wave'> Google Wave </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/google%2B'> google+ </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%2B%20api'> Google+ api </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Google%2B%20Communities'> Google+ Communities </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/googlenew'> googlenew </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/government'> government </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GSA'> GSA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GSA%207.0'> GSA 7.0 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/GSA%20for%20Commerce'> GSA for Commerce </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/guest%20post'> guest post </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/HALO%20Trust'> HALO Trust </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Hangout%20on%20Air'> Hangout on Air </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Hangouts%20on%20Air'> Hangouts on Air </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/HEAT'> HEAT </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/hints%20and%20tips'> hints and tips </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/HIPAA'> HIPAA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Inbox'> Inbox </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Inbox%20by%20Gmail'> Inbox by Gmail </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/innovation'> innovation </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/international%20trade'> international trade </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Internet%20Explorer'> Internet Explorer </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/intranet'> intranet </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/io2011'> io2011 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/iOS'> iOS </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/iPad'> iPad </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/IT'> IT </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/K-12'> K-12 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Kubernetes'> Kubernetes </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/large%20business'> large business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MAM'> MAM </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/manufacturing'> manufacturing </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Mapping%20a%20better%20world'> Mapping a better world </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/marketplace'> marketplace </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/marketplace%20highlights'> marketplace highlights </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mashups'> mashups </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MCCs'> MCCs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MDM'> MDM </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/medium%20business'> medium business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/migration'> migration </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mobile'> mobile </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mobile%20management'> mobile management </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/model%20contract%20clauses'> model contract clauses </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/moms'> moms </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Mother%27s%20Day'> Mother&#39;s Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/mpstaffpick'> mpstaffpick </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/MyHEAT'> MyHEAT </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/NAVMAN'> NAVMAN </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/new%20features'> new features </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/news'> news </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Niagara%20International%20Transportation%20Technology%20Coalition'> Niagara International Transportation Technology Coalition </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/non-profit'> non-profit </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/noteworthy'> noteworthy </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/offline'> offline </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/OpenID%20Connect'> OpenID Connect </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Parters'> Parters </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/partner'> partner </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Partner%20Showcase'> Partner Showcase </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/partners'> partners </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Place%20Summaries'> Place Summaries </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Postini'> Postini </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/privacy'> privacy </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/product%20ideas'> product ideas </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/productivity'> productivity </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Quickoffice'> Quickoffice </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Receptionist%27s%20Day'> Receptionist&#39;s Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/reports'> reports </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Reseller'> Reseller </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/retail'> retail </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/RSA'> RSA </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Safer%20Internet%20Day'> Safer Internet Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SBW2013'> SBW2013 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SBW2014'> SBW2014 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/sbweek'> sbweek </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SCCs'> SCCs </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Search'> Search </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Security'> Security </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Security%20Key'> Security Key </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/small%20business'> small business </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Small%20Business%20Week'> Small Business Week </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Small%20businesses'> Small businesses </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/SMB'> SMB </a> </li> <li> <span dir='ltr'> spam and security trends </span> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Startups'> Startups </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/success%20story'> success story </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/support'> support </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/switch'> switch </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/System%20Admin'> System Admin </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/T%20Dispatch'> T Dispatch </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Teamwork%202015'> Teamwork 2015 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Thanksgiving'> Thanksgiving </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Transport%20and%20Logistics'> Transport and Logistics </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Trust'> Trust </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/UK'> UK </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/university'> university </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/University%20of%20Calgary'> University of Calgary </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Updates'> Updates </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/utilities'> utilities </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veteran%20Owned%20Businesses'> Veteran Owned Businesses </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veterans%20Day'> Veterans Day </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veterans%20Day%202013'> Veterans Day 2013 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Veterans%20Day%202014'> Veterans Day 2014 </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/viewpoint'> viewpoint </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/VNX'> VNX </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/wallet'> wallet </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/webinar'> webinar </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/webmaster'> webmaster </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Winter'> Winter </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/women%20in%20tech'> women in tech </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Women%27s%20History%20Month'> Women&#39;s History Month </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/Work%20Resolutions'> Work Resolutions </a> </li> <li> <a dir='ltr' href='https://cloud.googleblog.com/search/label/World%20Bank'> World Bank </a> </li> </ul> <div class='clear'></div> </div> </div><div class='widget BlogArchive' data-version='1' id='BlogArchive1'> <div class='tab'> <i class='material-icons icon'> &#58055; </i> <h2> Archive </h2> <i class='material-icons arrow'> &#58821; </i> </div> <div class='widget-content'> <div id='ArchiveList'> <div id='BlogArchive1_ArchiveList'> <ul class='hierarchy'> <li class='archivedate expanded'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy toggle-open'> <i class='material-icons'> &#58823; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2016/'> 2016 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate expanded'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2016/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2015/'> 2015 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2015/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2014/'> 2014 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2014/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2013/'> 2013 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2013/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2012/'> 2012 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2012/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2011/'> 2011 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2011/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2010/'> 2010 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2010/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2009/'> 2009 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2009/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2008/'> 2008 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2008/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2007/'> 2007 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2007/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class='intervalToggle'> <span class='new-toggle' href='javascript:void(0)'> <i class='material-icons arrow'> &#58821; </i> </span> <a class='toggle' href='javascript:void(0)' style='display: none'> <span class='zippy'> <i class='material-icons'> &#58821; </i> &#160; </span> </a> <a class='post-count-link' href='https://cloud.googleblog.com/2006/'> 2006 </a> </div> <div class='items'> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/12/'> December </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/11/'> November </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/10/'> October </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/09/'> September </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/08/'> August </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/07/'> July </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/06/'> June </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/05/'> May </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/04/'> April </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/03/'> March </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/02/'> February </a> </div> <div class='items'> </div> </li> </ul> <ul class='hierarchy'> <li class='archivedate collapsed'> <div class=''> <a class='post-count-link' href='https://cloud.googleblog.com/2006/01/'> January </a> </div> <div class='items'> </div> </li> </ul> </div> </li> </ul> </div> </div> <div class='clear'></div> </div> </div><div class='widget HTML' data-version='1' id='HTML6'> <div class='widget-content'> <a href="http://cloud.blogspot.com/atom.xml"> <img src="data:image/png;base64,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" class="sidebar-icon" /> <h2>Feed</h2> </a> </div> <div class='clear'></div> </div></div> <div class='section' id='sidebar-bottom'><div class='widget HTML' data-version='1' id='HTML5'> <div class='widget-content'> <div class="followgooglewrapper"> <a href="http://plus.google.com/+googlecloud" rel="publisher" style="text-decoration:none;display:inline-block;color:#333;text-align:center; font:13px/16px arial,sans-serif;white-space:nowrap;"> <span style="display:inline-block;font-weight:bold;vertical-align:top;margin-right:5px; margin-top:0px;">Google</span><span style="display:inline-block;vertical-align:top;margin-right:13px; margin-top:0px;">on</span> <img src="//ssl.gstatic.com/images/icons/gplus-16.png" alt="Google+" style="border:0;width:16px;height:16px;"/></a> </div> <div class='followgooglewrapper'> <script src="https://apis.google.com/js/plusone.js"></script> <div class="g-ytsubscribe" data-channel="GoogleApps" data-layout="full"></div> </div> <!--Twitter--> <div class="share followgooglewrapper"> <button data-href="https://twitter.com/gsuite" onclick='sharingPopup(this);' id='twitter-share'><span class="twitter-follow">Follow @gsuite</span></button> <script> function sharingPopup (button) { var url = button.getAttribute("data-href"); window.open( url,'popUpWindow','height=500,width=500,left=10,top=10,resizable=yes,scrollbars=yes,toolbar=yes,menubar=no,location=no,directories=no,status=yes'); } </script> </div> </div> <div class='clear'></div> </div><div class='widget HTML' data-version='1' id='HTML1'> <h2 class='title'> Useful Links </h2> <div class='widget-content'> <a href="https://gsuite.google.com/together/">G Suite</a><br /><a href="https://apps.google.com/products/gmail/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=gmail">Gmail</a><br /><a href="https://apps.google.com/products/hangouts/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=hangouts">Hangouts</a><br /><a href="https://apps.google.com/products/calendar/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=calendar">Calendar</a><br /><a href="https://apps.google.com/products/googleplus/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=gplus">Google+</a><br /><a href="https://apps.google.com/products/drive/?utm_medium=et&utm_source=appsblog&utm_campaign=en&utm_content=drive">Google Drive</a><br /><a href="https://www.google.com/work/mapsearth/">Google Maps</a><br /><a href="https://cloud.google.com/">Google Cloud Platform</a> </div> <div class='clear'></div> </div></div> </div> </div> <div style='clear:both;'></div> </div> <!-- Footer --> <div class='footer-outer loading'> <div class='footer-inner'> <div class='footer-inner-2'> <div style='width:33%;float:left;'> <div class='section' id='footer-1'><div class='widget HTML' data-version='1' id='HTML2'> <h2 class='title'> Company-wide </h2> <div class='widget-content'> <ul> <li> <a href="//googleblog.blogspot.com/" title="Official Google">Official Google Blog</a> </li> <li> <a href="//googlepublicpolicy.blogspot.com/" title="Public Policy">Public Policy Blog</a> </li> <li> <a href="//googleforstudents.blogspot.com/" title="Student">Student Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='width:33%;float:left;'> <div class='section' id='footer-2'><div class='widget HTML' data-version='1' id='HTML3'> <h2 class='title'> Products </h2> <div class='widget-content'> <ul> <li> <a href="//officialandroid.blogspot.com/" title="Android">Android Blog</a> </li> <li> <a href="//chrome.blogspot.com/" title="Chrome">Chrome Blog</a> </li> <li> <a href="//google-latlong.blogspot.com/" title="Lat Long">Lat Long Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='width:33%;float:left;'> <div class='section' id='footer-3'><div class='widget HTML' data-version='1' id='HTML4'> <h2 class='title'> Developers </h2> <div class='widget-content'> <ul> <li> <a href="//googledevelopers.blogspot.com/" title="Developers">Developers Blog</a> </li> <li> <a href="//googleadsdeveloper.blogspot.com/" title="Ads Developer">Ads Developer Blog</a> </li> <li> <a href="//android-developers.blogspot.com/" title="Android">Android Developers Blog</a> </li> </ul> </div> <div class='clear'></div> </div></div> </div> <div style='clear:both;'></div> </div> </div> </div> <div class='google-footer-outer loading'> <div id='google-footer'> <a href='//www.google.com/'> <img class='google-logo-dark' height='36' src='data:image/png;base64,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' style='margin-top: -16px;' width='92'/> </a> <ul> <li> <a href='//www.google.com/'> Google </a> </li> <li> <a href='//www.google.com/policies/privacy/'> Privacy </a> </li> <li> <a href='//www.google.com/policies/terms/'> Terms </a> </li> </ul> </div> </div> <script type='text/javascript'> //<![CDATA[ // Social sharing popups. var postEl = document.getElementsByClassName('social-wrapper'); var postCount = postEl.length; for(i=0; i<postCount;i++){ postEl[i].addEventListener("click", function(event){ var postUrl = this.getAttribute("data-href"); window.open( postUrl,'popUpWindow','height=500,width=500,left=10,top=10,resizable=yes,scrollbars=yes,toolbar=yes,menubar=no,location=no,directories=no,status=yes'); });} //]]> </script> <script type='text/javascript'> //<![CDATA[ var BreakpointHandler = function() { this.initted = false; this.isHomePage = false; this.isMobile = false; }; BreakpointHandler.prototype.finalizeSummary = function(summaryHtml, lastNode) { // Use $.trim for IE8 compatibility summaryHtml = $.trim(summaryHtml).replace(/(<br>|\s)+$/,''); if (lastNode.nodeType == 3) { var lastChar = summaryHtml.slice(-1); if (!lastChar.match(/[.”"?]/)) { if (!lastChar.match(/[A-Za-z]/)) { summaryHtml = summaryHtml.slice(0, -1); } summaryHtml += ' ...'; } } else if (lastNode.nodeType == 1 && (lastNode.nodeName == 'I' || lastNode.nodeName == 'A')) { summaryHtml += ' ...'; } return summaryHtml; }; BreakpointHandler.prototype.generateSummaryFromContent = function(content, numWords) { var seenWords = 0; var summaryHtml = ''; for (var i=0; i < content.childNodes.length; i++) { var node = content.childNodes[i]; var nodeText; if (node.nodeType == 1) { if (node.hasAttribute('data-about-pullquote')) { continue; } nodeText = node.textContent; if (nodeText === undefined) { // innerText for IE8 nodeText = node.innerText; } if (node.nodeName == 'DIV' || node.nodeName == 'B') { // Don't end early if we haven't seen enough words. if (seenWords < 10) { continue; } if (i > 0) { summaryHtml = this.finalizeSummary(summaryHtml, content.childNodes[i-1]); } break; } summaryHtml += node.outerHTML; } else if (node.nodeType == 3) { nodeText = node.nodeValue; summaryHtml += nodeText + ' '; } var words = nodeText.match(/\S+\s*/g); if (!words) { continue; } var remain = numWords - seenWords; if (words.length >= remain) { summaryHtml = this.finalizeSummary(summaryHtml, node); break; } seenWords += words.length; } return summaryHtml; }; BreakpointHandler.prototype.detect = function() { var match, pl = /\+/g, search = /([^&=]+)=?([^&]*)/g, decode = function (s) { return decodeURIComponent(s.replace(pl, " ")); }, query = window.location.search.substring(1); var urlParams = {}; while (match = search.exec(query)) urlParams[decode(match[1])] = decode(match[2]); this.isListPage = $('html').hasClass('list-page'); this.isMobile = urlParams['m'] === '1'; this.isHomePage = window.location.pathname == '/'; }; BreakpointHandler.prototype.initContent = function() { var self = this; $('.post').each(function(index) { var body = $(this).children('.post-body')[0]; var content = $(body).children('.post-content')[0]; $(content).addClass('post-original'); var data = $(content).children('script').html(); data = self.rewriteForSSL(data); // If exists, extract specified editor's preview. var match = data.match(/([\s\S]+?)<div data-is-preview.+?>([\s\S]+)<\/div>/m); if (match) { data = match[1]; } // Prevent big images from loading when they aren't needed. // This must be done as a pre-injection step, since image loading can't be // canceled once embedded into the DOM. if (self.isListPage && self.isMobile) { data = data.replace(/<(img|iframe) .+?>/g, ''); } // Insert template to be rendered as nodes. content.innerHTML = data; if (self.isListPage) { var summary = document.createElement('div'); $(summary).addClass('post-content'); $(summary).addClass('post-summary'); body.insertBefore(summary, content); if (match) { // Use provided summary. summary.innerHTML = match[2]; } else { // Generate a summary. // Summary generation relies on DOM, so it must occur after content is // inserted into the page. summary.innerHTML = self.generateSummaryFromContent(content, 30); } // Add read more link to summary. var titleAnchor = $(this).find('.title a')[0]; var link = titleAnchor.cloneNode(true); link.innerHTML = 'Read More'; $(link).addClass('read-more'); summary.appendChild(link); } }); // Firefox does not allow for proper styling of BR. if (navigator.userAgent.indexOf('Firefox') > -1) { $('.post-content br').replaceWith('<span class="space"></span>'); } $('.loading').removeClass('loading'); }; BreakpointHandler.prototype.process = function() { if (!this.initted) { var makeInsecureImageRegex = function(hosts) { var whitelist = hosts.join('|').replace(/\./g,'\\.'); // Normal image tags, plus input images (yes, this is possible!) return new RegExp('(<(img|input)[^>]+?src=("|\'))http:\/\/(' + whitelist +')', 'g'); }; this.sslImageRegex = makeInsecureImageRegex(BreakpointHandler.KNOWN_HTTPS_HOSTS); this.sslImageCurrentDomainRegex = makeInsecureImageRegex([window.location.hostname]); this.detect(); this.initContent(); this.initted = true; } }; BreakpointHandler.KNOWN_HTTPS_HOSTS = [ "www.google.org", "www.google.com", "services.google.com", "blogger.com", "draft.blogger.com", "www.blogger.com", "photos1.blogger.com", "photos2.blogger.com", "photos3.blogger.com", "blogblog.com", "img1.blogblog.com", "img2.blogblog.com", "www.blogblog.com", "www1.blogblog.com", "www2.blogblog.com", "0.bp.blogspot.com", "1.bp.blogspot.com", "2.bp.blogspot.com", "3.bp.blogspot.com", "4.bp.blogspot.com", "lh3.googleusercontent.com", "lh4.googleusercontent.com", "lh5.googleusercontent.com", "lh6.googleusercontent.com", "themes.googleusercontent.com", ]; BreakpointHandler.prototype.rewriteForSSL = function(html) { // Handle HTTP -> HTTPS source replacement of images, movies, and other embedded content. return html.replace(this.sslImageRegex, '$1https://$4') .replace(this.sslImageCurrentDomainRegex, '$1//$4') .replace(/(<(embed|iframe)[^>]+?src=("|'))http:\/\/([^"']*?(youtube|picasaweb\.google)\.com)/g, '$1https://$4') // Slideshow SWF takes a image host, so we need to rewrite that parameter. .replace(/(<embed[^>]+?feed=http(?=[^s]))/g, '$1s'); }; $(document).ready(function() { var handler = new BreakpointHandler(); handler.process(); // Top-level navigation. $(".BlogArchive .tab").click(function(ev) { ev.preventDefault(); $(this).parent().toggleClass('active'); $(this).siblings().slideToggle(300); }); $(".Label .tab").click(function(ev) { ev.preventDefault(); $(this).parent().toggleClass('active'); $(this).siblings().slideToggle(300); }); // Blog archive year expansion. $('.BlogArchive .intervalToggle').click(function(ev) { ev.preventDefault(); if ($(this).parent().hasClass('collapsed')) { $(this).parent().removeClass('collapsed'); $(this).parent().addClass('expanded'); } else { $(this).parent().removeClass('expanded'); $(this).parent().addClass('collapsed'); } }); // Reverse order of months. $('.BlogArchive .intervalToggle + div').each(function(_, items) { var year = $(this); year.children().each(function(_, month) { year.prepend(month); }); }); // Set anchors to open in new tab. $('.post-content img').parent().each(function(_, node) { if (node.nodeName == 'A') { $(this).attr('target', '_blank'); } }); // Process search requests. $('.searchBox input').on("keypress", function(ev) { if (ev.which == 13) { window.location.href = 'https://www.google.com/search?q=site%3A' + window.location.hostname + '%20' + encodeURIComponent ($(this).val()); } }); }); //]]> </script> <script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/984859869-widgets.js"></script> <script type='text/javascript'> window['__wavt'] = 'AOuZoY5YEC1_uteSu3xJ-ZRd8CdZ3Zn7gQ:1732368179940';_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d6567687196385815607','//cloud.googleblog.com/search/label/spam%20and%20security%20trends','6567687196385815607'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '6567687196385815607', 'title': 'Official Google Cloud Blog', 'url': 'https://cloud.googleblog.com/search/label/spam%20and%20security%20trends', 'canonicalUrl': 'https://cloud.googleblog.com/search/label/spam%20and%20security%20trends', 'homepageUrl': 'https://cloud.googleblog.com/', 'searchUrl': 'https://cloud.googleblog.com/search', 'canonicalHomepageUrl': 'https://cloud.googleblog.com/', 'blogspotFaviconUrl': 'https://cloud.googleblog.com/favicon.ico', 'bloggerUrl': 'https://www.blogger.com', 'hasCustomDomain': true, 'httpsEnabled': true, 'enabledCommentProfileImages': true, 'gPlusViewType': 'FILTERED_POSTMOD', 'adultContent': false, 'analyticsAccountNumber': 'UA-18038-3', 'encoding': 'UTF-8', 'locale': 'en', 'localeUnderscoreDelimited': 'en', 'languageDirection': 'ltr', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'isDynamicViewsAvailable': true, 'feedLinks': '\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Official Google Cloud Blog - Atom\x22 href\x3d\x22https://cloud.googleblog.com/feeds/posts/default\x22 /\x3e\n\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/rss+xml\x22 title\x3d\x22Official Google Cloud Blog - RSS\x22 href\x3d\x22https://cloud.googleblog.com/feeds/posts/default?alt\x3drss\x22 /\x3e\n\x3clink rel\x3d\x22service.post\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Official Google Cloud Blog - Atom\x22 href\x3d\x22https://www.blogger.com/feeds/6567687196385815607/posts/default\x22 /\x3e\n', 'meTag': '', 'adsenseHostId': 'ca-host-pub-1556223355139109', 'adsenseHasAds': false, 'adsenseAutoAds': false, 'boqCommentIframeForm': true, 'loginRedirectParam': '', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/d78375fb222d99b3', 'plusOneApiSrc': 'https://apis.google.com/js/platform.js', 'disableGComments': true, 'interstitialAccepted': false, 'sharing': {'platforms': [{'name': 'Get link', 'key': 'link', 'shareMessage': 'Get link', 'target': ''}, {'name': 'Facebook', 'key': 'facebook', 'shareMessage': 'Share to Facebook', 'target': 'facebook'}, {'name': 'BlogThis!', 'key': 'blogThis', 'shareMessage': 'BlogThis!', 'target': 'blog'}, {'name': 'X', 'key': 'twitter', 'shareMessage': 'Share to X', 'target': 'twitter'}, {'name': 'Pinterest', 'key': 'pinterest', 'shareMessage': 'Share to Pinterest', 'target': 'pinterest'}, {'name': 'Email', 'key': 'email', 'shareMessage': 'Email', 'target': 'email'}], 'disableGooglePlus': true, 'googlePlusShareButtonWidth': 0, 'googlePlusBootstrap': '\x3cscript type\x3d\x22text/javascript\x22\x3ewindow.___gcfg \x3d {\x27lang\x27: \x27en\x27};\x3c/script\x3e'}, 'hasCustomJumpLinkMessage': false, 'jumpLinkMessage': 'Read more', 'pageType': 'index', 'searchLabel': 'spam and security trends', 'pageName': 'spam and security trends', 'pageTitle': 'Official Google Cloud Blog: spam and security trends'}}, {'name': 'features', 'data': {}}, {'name': 'messages', 'data': {'edit': 'Edit', 'linkCopiedToClipboard': 'Link copied to clipboard!', 'ok': 'Ok', 'postLink': 'Post Link'}}, {'name': 'template', 'data': {'name': 'custom', 'localizedName': 'Custom', 'isResponsive': false, 'isAlternateRendering': false, 'isCustom': true}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\x3dclassic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\x3dflipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\x3dmagazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\x3dmosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\x3dsidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\x3dsnapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\x3dtimeslide'}, 'isMobile': false, 'title': 'Official Google Cloud Blog', 'description': 'Built in the cloud. Engineered for your enterprise.', 'url': 'https://cloud.googleblog.com/search/label/spam%20and%20security%20trends', 'type': 'feed', 'isSingleItem': false, 'isMultipleItems': true, 'isError': false, 'isPage': false, 'isPost': false, 'isHomepage': false, 'isArchive': false, 'isSearch': true, 'isLabelSearch': true, 'search': {'label': 'spam and security trends', 'resultsMessage': 'Showing posts with the label spam and security trends', 'resultsMessageHtml': 'Showing posts with the label \x3cspan class\x3d\x27search-label\x27\x3espam and security trends\x3c/span\x3e'}}}]); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'main', document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'navMessage': 'Showing posts with label \x3cb\x3espam and security trends\x3c/b\x3e. \x3ca href\x3d\x22https://cloud.googleblog.com/\x22\x3eShow all posts\x3c/a\x3e'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML8', 'sidebar-top', document.getElementById('HTML8'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_LabelView', new _WidgetInfo('Label1', 'sidebar', document.getElementById('Label1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogArchiveView', new _WidgetInfo('BlogArchive1', 'sidebar', document.getElementById('BlogArchive1'), {'languageDirection': 'ltr', 'loadingMessage': 'Loading\x26hellip;'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML6', 'sidebar', document.getElementById('HTML6'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML5', 'sidebar-bottom', document.getElementById('HTML5'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML1', 'sidebar-bottom', document.getElementById('HTML1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML2', 'footer-1', document.getElementById('HTML2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML3', 'footer-2', document.getElementById('HTML3'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML4', 'footer-3', document.getElementById('HTML4'), {}, 'displayModeFull')); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10