Blog Posts Tagged with "SPAM"

69dafe8b58066478aea48f3d0f384820

DMARC Email Authentication Work Group Launched

January 31, 2012 Added by:Headlines

The group's work includes a draft specification that helps create a feedback loop between legitimate email senders and receivers to make impersonation more difficult for phishers trying to send fraudulent email...

Comments  (0)

37d5f81e2277051bc17116221040d51c

2012 Threats: Are You Ready?

January 30, 2012 Added by:Robert Siciliano

Attackers from all over the world have set their focus on critical life supporting utilities such as water and power to hold those utilities hostage for payment or to disable them to cause terror. Unfortunately, many industrial and national infrastructure networks are vulnerable...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Microsoft is Waging Cyberwar

September 30, 2011 Added by:Joel Harding

A federal court judge taps his gavel and the request for taking down a domain and all sub-domains is approved. This indicates to me that a corporation is taking care of me, a private citizen. It also indicates that the government cannot or will not protect me...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Hits Domain Provider in Kelihos Botnet Battle

September 28, 2011 Added by:Headlines

"We wanted to take it out early enough so that number one, it wouldn't grow and propagate... but also to make the point that when a threat is down, it's going to stay down. I think we made that point pretty effectively in this particular operation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Scammers Exploiting Bogus DigiNotar SSL Certificates

September 20, 2011 Added by:Headlines

Security provider Barracuda Networks has warned of a spamming campaign targeting Royal Bank of Canada customers. The spam messages falsely notify users that their SSL certificate has expired, and that in order to continue using online banking services they are required to update the certificate...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Question: Why Cybercrime?

August 30, 2011 Added by:Craig S Wright

Cybercriminals are actually extremely rational. And not necessarily talking of hacktivists and others without a clear profit motive, but those with a drive to make money act extremely rationally. Consequently, there is a solution: Reduce their profit...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Find LinkedIn Spam Downloads Trojan

August 29, 2011 Added by:Headlines

"These password-stealing Trojans are programmed to insert themselves into the browser stack and can intercept login pages even before they are encrypted by HTTPS... code snippets ask for additional security questions or special passwords, information the password thieves want..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Spreading via Facebook Friend Requests

August 24, 2011 Added by:Headlines

The malware is spreading by sending messages through Facebook notifications. When a user clicks the link to approve a "friend" request it opens a page that invites him to install the what is purported to be the latest version of Adobe Flash Player, but actually installs the malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spammers Raise Their Game

August 18, 2011 Added by:Headlines

According to new research conducted by M86 Security Labs, the number of malicious spam emails has increased significantly in August. Last week spams increased by 13%, while this week it has increased another 24%. The majority of these spams are coming from the Cutwail, Festi and Asprox botnets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Canadian Hacker Arrested for Creating Zombie Botnet

July 20, 2011 Added by:Headlines

Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...

Comments  (2)

8c4834b99847b9f7c9ee94b45df086f9

Jay Leno: Most Dangerous Celebrity in Cyberspace

July 18, 2011 Added by:Emmett Jorgensen

“Cyber criminals follow the latest trends just as consumers do and they use these and the names of popular celebrities in their campaigns in order to lure people to websites that are full of malicious software (malware)..."

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Is Google+ Worth the Potential Risk to Your Privacy?

July 05, 2011 Added by:Keith Mendoza

I simply find it amusing that everyone is so desperate to get into Google+ that they are willing to give their email addresses to complete strangers on twitter and the many online forums out there. Has everyone suddenly forgotten about spam?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Federal Reserve Spam Message Carries Zeus Payload

June 30, 2011 Added by:Headlines

"The attack appears [to] focus on users of online banking services, especially small businesses and corporations. The messages are not well done. They are badly written and don’t really attempt to hide the fact that the attached file has the double extension .pdf.exe..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Phishing Ring Leader Sentenced to Thirteen Years

June 29, 2011 Added by:Headlines

Operation Phish Phry revealed how Egyptian hackers obtained account numbers and personal identification information from bank customers through phishing — a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Joint U.S.-China Report on Cybersecurity Released

May 27, 2011 Added by:Headlines

"In a time when most can only see a grim, downward spiral of recrimination when it comes to all things cyber, this report is the product of cooperation and offers some hope for an improved relationship between China and the US..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Symantec: Spammers Creating Fake URL Shorteners

May 25, 2011 Added by:Headlines

“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »