{"id":2042,"date":"2004-06-15T00:00:00","date_gmt":"2004-06-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/06\/15\/brightmail-and-imlogic-to-fight-instant-spim\/"},"modified":"2021-12-30T11:40:32","modified_gmt":"2021-12-30T11:40:32","slug":"brightmail-and-imlogic-to-fight-instant-spim","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/06\/15\/brightmail-and-imlogic-to-fight-instant-spim\/","title":{"rendered":"Brightmail and IMlogic to fight instant spim"},"content":{"rendered":"<p>A new word in the world of security: Spim<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spim affects only a small number of people today, but the problem is growing. It accounts for between 5 percent and 8 percent of all business IM communications, according to The Yankee Group. According to data from Radicati Group, 400 million spim messages were sent in 2003. That number is likely to jump to 1.5 billion at the end of 2004, representing a growth rate triple that of traditional e-mail spam.&#8221; <\/p>\n<p>More info: http:\/\/news.com.com\/2100-1032_3-5228678.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2042","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2042"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2042\/revisions"}],"predecessor-version":[{"id":4529,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2042\/revisions\/4529"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}