Blog Posts Tagged with "SPAM"


New Insights into Email Spam Operations

June 01, 2014 Added by:Gianluca Stringhini

Recently, we have been working on gaining a better understanding of spam operations and of the actors involved in this underground economy. We believe that shedding light on these topics can help researchers develop novel mitigation techniques, and identifying which of the already-existing techniques are particularly effective in crippling spam operations, and should therefore be widely deployed.

Comments  (0)


SMTP Dialects: How to Detect Bots Looking at SMTP Conversations

October 03, 2012 Added by:Gianluca Stringhini

We need new techniques to detect and block spam. Current techniques mostly fall in two categories: content analysis and origin analysis. Content analysis techniques look at what is being sent, and typically analyze the content of an email to see if it is indicative of spam...

Comments  (6)


Dropbox Security Issues: IT Has Only Itself to Blame

August 06, 2012 Added by:Ben Kepes

For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...

Comments  (0)


Cyber Criminals Hiding Behind Travel Emails

June 17, 2012 Added by:Theresa Payton

Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...

Comments  (0)


LinkedIn Breach Part II: What You Need to Prepare for Next

June 09, 2012 Added by:Jason Clark

The LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate DLP consequences and tighten network security. You need a strategy to protect against attack scenarios. Here’s a seven-step check list for mitigating your risk...

Comments  (4)


What Are the Risks of Mobile Spam?

June 05, 2012 Added by:Robert Siciliano

While spam is mostly annoying, it can also pose some risks. You could even be tricked into paying for products and services that turn out to be illegitimate or nonexistent. Spam can also be used to distribute Trojans, spyware, and exploit code that can infect your mobile device or steal your information...

Comments  (2)


Social Media Seeks Control Through TOS Enforcement

May 21, 2012 Added by:David Navetta

So far, social media companies have only sought to squash undesirable behavior on their platforms from third party commercial entities, such as spammers or those seeking password sharing, but in the future such litigation could be viable against individual users...

Comments  (0)


Manager of Phishing Ring Sentenced to Five Years in Prison

May 15, 2012 Added by:Headlines

A principal figure in the domestic arm of an international “phishing” operation that used spam e-mails and bogus websites to defraud American banks was found guilty of bank and wire fraud, identity theft, computer fraud, and money laundering and sentenced to five years in federal prison...

Comments  (0)


The Fight Against Spam Might Get a Little Easier

May 11, 2012 Added by:Theresa Payton

Facebook recently announced efforts to stop spammers by creating the Antivirus Marketplace. The service will provide a free six month license to antivirus software. McAfee, Symantec, Sophos and others are teaming with Facebook to offer free antivirus software...

Comments  (0)


On the Underground Economy of Twitter Followers

May 06, 2012 Added by:Gianluca Stringhini

All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...

Comments  (0)


Symantec Internet Security Threat Report Summary

May 01, 2012 Added by:Headlines

"In addition to the 81% surge in attacks, the number of unique malware variants also increased by 41% and the number of Web attacks blocked per day also increased dramatically, by 36%. Greater numbers of more widespread attacks employed advanced techniques..."

Comments  (2)


Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (1)


Security Measures to Protect Business Twitter Accounts

April 27, 2012 Added by:Robert Siciliano

Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...

Comments  (0)


Fake LinkedIn Notifications Serving Up Malware

April 20, 2012 Added by:Headlines

Researchers are reporting bogus LinkedIn notifications that lead users to malware. The spoofed notifications look legitimate, sporting the LinkedIn logo and a format familiar to members of the business networking platform, making the operation difficult to detect...

Comments  (0)


Twitter Spam Campaign Serving Up Rogue Antivirus

April 19, 2012 Added by:Headlines

"Early today, Kaspersky Lab discovered a new ongoing spam campaign on Twitter. Hundreds of compromised accounts are currently spamming malicious links, hosted on .TK and domains, leading to Rogue Anti Virus softwares," writes Kasperky's Nicolas Brulez...

Comments  (0)


How to Hack Into the Music Industry

March 29, 2012 Added by:Quintius Walker

When it comes to the vulnerabilities presented by the online aspects of the music industry, the opportunities for penetration tester’s to employ their skills are far and wide. However, they are still for the most part often overlooked. And with great peril...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »