Author: tetiana.vashchenko@data443.com

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).   The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing

Keeping the Zombies out

The continuing spread of botnets poses a new challenge for online and mobile application designers. Malware-infected machines often have code installed to log keystrokes, steal information, or even initiate background actions without the user’s knowledge. As designers, how do you ensure that the user really is who they say they

Compromised Yahoo accounts spread Android malware

The surest way to know that an attack method is working for a malware gang is seeing the method repeated over a period of several months. In Commtouch’s October Trend Report we described an attack targeting Android users. Last week saw a repeat of the attack with a few refinements.

Election of New Pope used as Lure in Malware Attacks

It’s tough being a malware distributor – you can’t exactly go around asking people to install your malware – you need to be creative. So a global newsstory such as the election of Pope Francis is too good an opportunity to pass up. The attack, launched a few days after

Sometimes guards, guns, and gates are not enough!

Earlier in my career I spent several years working in the physical security sector, working on advanced detection technologies. Since I joined Commtouch, I have been surprised by how many parallels there are between the physical and logical security sectors. Both are founded on ’hardening’ your perimeter to ensure that

Preventing Outbound Spam and Blacklisting

Blocked IP ranges resulting in customer loss, operational cost increases, brand damage and even potential lawsuits are potential negative consequences service providers face as a result of spam, phishing and malware emails emanating from their networks. But where does outbound spam come from? Outbound spam emails coming from service provider

Over 178,000 Android malware samples seen in January

The Android OS is now installed on hundreds of millions of devices. In Q3 2012 alone, 122 million Android devices were sold, compared to 60 million for the same period in 2011 (Gartner – November 2012). Cybercriminals have clearly taken notice of the huge number of devices, as evidenced by

Dealing with the “unknown unknowns”

“There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don’t know. But there are also unknown unknowns – the ones we don’t know we don’t know.” Former US Secretary of Defense Donald

Email Security SaaS für Sicherheitsanbieter und Service Provider

Heute hat Commtouch (führender Anbieter von Internetsicherheitstechnologien und Cloud-basierten Services) Email Security für SaaS vorgestellt: der neue Service ermöglicht es Security-Anbietern und Service Providern, schnell und kostengünstig mit einer Private-Label-Lösung vom Wachstumsmarkt Security as a Service zu profitieren. Bei Commtouch Email Security SaaS handelt es sich um eine hochleistungsfähige Cloud-basierte

“Sicherheit im Beerenanbau” – doppelt unerwünschte Spam-E-Mails

Unerwünscht und ärgerlich – zwei Adjektive, die beim Thema Spam jedem einfallen. Unerwünschte Werbung in Massen im Postfach der E-Mail Nutzer, davor schützt inzwischen ein Spam-Filter. Was jedoch tun, wenn Themen beworben werden, mit denen man gar nichts zu tun hat? So geschehen ist es der Website proberry.de. Seit Mittwoch