Blog Posts Tagged with "SPAM"


How to Hack Into the Music Industry

March 29, 2012 Added by:Quintius Walker

When it comes to the vulnerabilities presented by the online aspects of the music industry, the opportunities for penetration tester’s to employ their skills are far and wide. However, they are still for the most part often overlooked. And with great peril...

Comments  (0)


Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)


Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Plagiarist Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)


Spoofed LinkedIn Messages Serving BlackHole Exploit

March 19, 2012 Added by:Headlines

"Be advised that there are fake Linkedin invitation reminders in circulation sending users to a BlackHole exploit which attempts to drop Cridex onto the PC. Cridex is a rather nasty piece of work that does everything from target banks and social networking accounts..."

Comments  (0)


It's Not the Spam Email But What Lies Behind Them

March 15, 2012 Added by:Alan Woodward

The fact that such large proportion of home machines host unknown malware hides a bigger threat. By hijacking so many PCs it is possible to mount a massive probing operation that can seek out high value targets that are susceptible to classic hacking attacks...

Comments  (0)


Leveraging Email Lists for Detecting Botnet IPs

March 04, 2012 Added by:Gianluca Stringhini

We propose a third way of performing botnet mitigation. Instead of learning different features to identify and attack the different botnets, we study how bots behave when sending spam, allow us to distinguish between bot infected machines and legitimate users...

Comments  (0)


Can You Stamp Out Spambots? No, But Stop Being a Victim

March 01, 2012 Added by:Michelle Drolet

Attackers avoid creating recognizable patterns of attack, installing backdoors for easy re-entry. There are limitless ways of eluding detection by anti-malware tools. Heuristics and fuzzy logic are an improvement, but a far cry from the detection needs of organizations...

Comments  (0)


Is LinkedIn Really Secure?

February 24, 2012 Added by:Brittany Lyons

LinkedIn has faced scams and viral attacks, and users have watched private information become public without their permission. Online vulnerability is a problem, and though LinkedIn has addressed issues in a punctual manner, this does not prevent new problems from arising...

Comments  (0)


FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)


McAfee Report: No Immunity from Targeted Attacks

February 22, 2012 Added by:Headlines

“The threat landscape continued to evolve in 2011, and we saw a significant shift in motivation for cyber attacks. Increasingly, we’ve seen that no organization, platform or device is immune to the increasingly sophisticated and targeted threats..."

Comments  (0)


Is Information Online Legally Fair Game to Use for Marketing?

February 21, 2012 Added by:Rebecca Herold

Social media sites are booming. The amount of personal information posted to them, such as photos, videos, original stories, thoughts, gossip, is exploding. Marketers are drooling at the prospect of using all that “free” information. Well, it’s really not free, folks...

Comments  (0)


Waledac Spam Botnet Evolves into Password Sniffer

February 20, 2012 Added by:Headlines

Researchers form Palo Alto Networks have detected a new variation of the briefly defeated Waledac spamming botnet, but this version is able to sniff out login credentials for several email protocols as well as files with the .dat extension related to BitCoin and FTP...

Comments  (0)


How They Do IT: Spam Filters

February 08, 2012 Added by:Alan Woodward

The current volumes of spam email are extraordinary. Between 70% and 80% of all email sent are spam. As none of the current methods described here are completely effective, there is still scope for much further research in this area...

Comments  (0)


Seventy-Five Million Unique Malware Samples in 2012

February 08, 2012 Added by:Robert Siciliano

Imagine your body being targeted by 75 million viruses. That is exactly what’s happening to your digital devices. Laptops, desktops, netbooks, notebooks, Macs, iPads, iPhones, BlackBerrys, Androids, and Symbian mobile phones are all being targeted...

Comments  (0)


OTA Endorses Domain-Based Message Authentication (DMARC)

February 02, 2012 Added by:Headlines

"Since 2004, OTA has been on the forefront of advancing best practices to restore trust in email and to protect consumers from harm. We are excited about the promise of DMARC and how it builds on these efforts enhancing brand, business and consumer protection..."

Comments  (0)


Looking Back: A Review of Threats Faced in 2011

February 02, 2012 Added by:Simon Heron

There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »