Blog Posts Tagged with "SPAM"

09dae715e355968a0e90ebddf038ad56

How to Hack Into the Music Industry

March 29, 2012 Added by:Quintius Walker

When it comes to the vulnerabilities presented by the online aspects of the music industry, the opportunities for penetration tester’s to employ their skills are far and wide. However, they are still for the most part often overlooked. And with great peril...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Plagiarist Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed LinkedIn Messages Serving BlackHole Exploit

March 19, 2012 Added by:Headlines

"Be advised that there are fake Linkedin invitation reminders in circulation sending users to a BlackHole exploit which attempts to drop Cridex onto the PC. Cridex is a rather nasty piece of work that does everything from target banks and social networking accounts..."

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

It's Not the Spam Email But What Lies Behind Them

March 15, 2012 Added by:Alan Woodward

The fact that such large proportion of home machines host unknown malware hides a bigger threat. By hijacking so many PCs it is possible to mount a massive probing operation that can seek out high value targets that are susceptible to classic hacking attacks...

Comments  (0)

B1c4090e84dcfac820a2b8ebe6eee82b

Leveraging Email Lists for Detecting Botnet IPs

March 04, 2012 Added by:Gianluca Stringhini

We propose a third way of performing botnet mitigation. Instead of learning different features to identify and attack the different botnets, we study how bots behave when sending spam, allow us to distinguish between bot infected machines and legitimate users...

Comments  (0)

E85787adcaf7bca10e799cfd1cfd08f1

Can You Stamp Out Spambots? No, But Stop Being a Victim

March 01, 2012 Added by:Michelle Drolet

Attackers avoid creating recognizable patterns of attack, installing backdoors for easy re-entry. There are limitless ways of eluding detection by anti-malware tools. Heuristics and fuzzy logic are an improvement, but a far cry from the detection needs of organizations...

Comments  (0)

8ab4e596af60cabbf46c7ecf016af0ad

Is LinkedIn Really Secure?

February 24, 2012 Added by:Brittany Lyons

LinkedIn has faced scams and viral attacks, and users have watched private information become public without their permission. Online vulnerability is a problem, and though LinkedIn has addressed issues in a punctual manner, this does not prevent new problems from arising...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee Report: No Immunity from Targeted Attacks

February 22, 2012 Added by:Headlines

“The threat landscape continued to evolve in 2011, and we saw a significant shift in motivation for cyber attacks. Increasingly, we’ve seen that no organization, platform or device is immune to the increasingly sophisticated and targeted threats..."

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is Information Online Legally Fair Game to Use for Marketing?

February 21, 2012 Added by:Rebecca Herold

Social media sites are booming. The amount of personal information posted to them, such as photos, videos, original stories, thoughts, gossip, is exploding. Marketers are drooling at the prospect of using all that “free” information. Well, it’s really not free, folks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Waledac Spam Botnet Evolves into Password Sniffer

February 20, 2012 Added by:Headlines

Researchers form Palo Alto Networks have detected a new variation of the briefly defeated Waledac spamming botnet, but this version is able to sniff out login credentials for several email protocols as well as files with the .dat extension related to BitCoin and FTP...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

How They Do IT: Spam Filters

February 08, 2012 Added by:Alan Woodward

The current volumes of spam email are extraordinary. Between 70% and 80% of all email sent are spam. As none of the current methods described here are completely effective, there is still scope for much further research in this area...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seventy-Five Million Unique Malware Samples in 2012

February 08, 2012 Added by:Robert Siciliano

Imagine your body being targeted by 75 million viruses. That is exactly what’s happening to your digital devices. Laptops, desktops, netbooks, notebooks, Macs, iPads, iPhones, BlackBerrys, Androids, and Symbian mobile phones are all being targeted...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Endorses Domain-Based Message Authentication (DMARC)

February 02, 2012 Added by:Headlines

"Since 2004, OTA has been on the forefront of advancing best practices to restore trust in email and to protect consumers from harm. We are excited about the promise of DMARC and how it builds on these efforts enhancing brand, business and consumer protection..."

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Looking Back: A Review of Threats Faced in 2011

February 02, 2012 Added by:Simon Heron

There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »