Blog

Insights on Data Security & Threat Intelligence

Building Your Digital Profile, Piece by Piece…

Livingsocial.com, the daily deals site was hacked last week, with details for over 50 Million accounts, including Customer Names, Emails, Birthdates and Encrypted Passwords being stolen. This event comes at a difficult time for the company, as they attempt a corporate comeback having recently received an infusion of cash from

Read More >

Poetry Spam: A Sole Act of Charity

Last week I received an email from Rina Patel (although her email address implies “Daniel” as first name), subject: “Kindly Assist”. Rina is from Japan (although her/ Daniel’s email address is from Uruguay) and was married to an English man from the UK, called “Late Sir Patel”. Sir Patel “was

Read More >

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).   The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing

Read More >

Keeping the Zombies out

The continuing spread of botnets poses a new challenge for online and mobile application designers. Malware-infected machines often have code installed to log keystrokes, steal information, or even initiate background actions without the user’s knowledge. As designers, how do you ensure that the user really is who they say they

Read More >

Compromised Yahoo accounts spread Android malware

The surest way to know that an attack method is working for a malware gang is seeing the method repeated over a period of several months. In Commtouch’s October Trend Report we described an attack targeting Android users. Last week saw a repeat of the attack with a few refinements.

Read More >

Election of New Pope used as Lure in Malware Attacks

It’s tough being a malware distributor – you can’t exactly go around asking people to install your malware – you need to be creative. So a global newsstory such as the election of Pope Francis is too good an opportunity to pass up. The attack, launched a few days after

Read More >

Sometimes guards, guns, and gates are not enough!

Earlier in my career I spent several years working in the physical security sector, working on advanced detection technologies. Since I joined Commtouch, I have been surprised by how many parallels there are between the physical and logical security sectors. Both are founded on ’hardening’ your perimeter to ensure that

Read More >