Blog Posts Tagged with "SPAM"

B1c4090e84dcfac820a2b8ebe6eee82b

SMTP Dialects: How to Detect Bots Looking at SMTP Conversations

October 03, 2012 Added by:Gianluca Stringhini

We need new techniques to detect and block spam. Current techniques mostly fall in two categories: content analysis and origin analysis. Content analysis techniques look at what is being sent, and typically analyze the content of an email to see if it is indicative of spam...

Comments  (6)

4c1c5119b03285e3f64bd83a8f9dfeec

Dropbox Security Issues: IT Has Only Itself to Blame

August 06, 2012 Added by:Ben Kepes

For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cyber Criminals Hiding Behind Travel Emails

June 17, 2012 Added by:Theresa Payton

Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

LinkedIn Breach Part II: What You Need to Prepare for Next

June 09, 2012 Added by:Jason Clark

The LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate DLP consequences and tighten network security. You need a strategy to protect against attack scenarios. Here’s a seven-step check list for mitigating your risk...

Comments  (4)

37d5f81e2277051bc17116221040d51c

What Are the Risks of Mobile Spam?

June 05, 2012 Added by:Robert Siciliano

While spam is mostly annoying, it can also pose some risks. You could even be tricked into paying for products and services that turn out to be illegitimate or nonexistent. Spam can also be used to distribute Trojans, spyware, and exploit code that can infect your mobile device or steal your information...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Social Media Seeks Control Through TOS Enforcement

May 21, 2012 Added by:David Navetta

So far, social media companies have only sought to squash undesirable behavior on their platforms from third party commercial entities, such as spammers or those seeking password sharing, but in the future such litigation could be viable against individual users...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Manager of Phishing Ring Sentenced to Five Years in Prison

May 15, 2012 Added by:Headlines

A principal figure in the domestic arm of an international “phishing” operation that used spam e-mails and bogus websites to defraud American banks was found guilty of bank and wire fraud, identity theft, computer fraud, and money laundering and sentenced to five years in federal prison...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Fight Against Spam Might Get a Little Easier

May 11, 2012 Added by:Theresa Payton

Facebook recently announced efforts to stop spammers by creating the Antivirus Marketplace. The service will provide a free six month license to antivirus software. McAfee, Symantec, Sophos and others are teaming with Facebook to offer free antivirus software...

Comments  (0)

B1c4090e84dcfac820a2b8ebe6eee82b

On the Underground Economy of Twitter Followers

May 06, 2012 Added by:Gianluca Stringhini

All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Internet Security Threat Report Summary

May 01, 2012 Added by:Headlines

"In addition to the 81% surge in attacks, the number of unique malware variants also increased by 41% and the number of Web attacks blocked per day also increased dramatically, by 36%. Greater numbers of more widespread attacks employed advanced techniques..."

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Measures to Protect Business Twitter Accounts

April 27, 2012 Added by:Robert Siciliano

Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Fake LinkedIn Notifications Serving Up Malware

April 20, 2012 Added by:Headlines

Researchers are reporting bogus LinkedIn notifications that lead users to malware. The spoofed notifications look legitimate, sporting the LinkedIn logo and a format familiar to members of the business networking platform, making the operation difficult to detect...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Spam Campaign Serving Up Rogue Antivirus

April 19, 2012 Added by:Headlines

"Early today, Kaspersky Lab discovered a new ongoing spam campaign on Twitter. Hundreds of compromised accounts are currently spamming malicious links, hosted on .TK and .tw1.su domains, leading to Rogue Anti Virus softwares," writes Kasperky's Nicolas Brulez...

Comments  (0)

09dae715e355968a0e90ebddf038ad56

How to Hack Into the Music Industry

March 29, 2012 Added by:Quintius Walker

When it comes to the vulnerabilities presented by the online aspects of the music industry, the opportunities for penetration tester’s to employ their skills are far and wide. However, they are still for the most part often overlooked. And with great peril...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »