Blog

Insights on Data Security & Threat Intelligence

Poetry Spam: A Sole Act of Charity

Last week I received an email from Rina Patel (although her email address implies “Daniel” as first name), subject: “Kindly Assist”. Rina is from Japan (although her/ Daniel’s email address is from Uruguay) and was married to an English man from the UK, called “Late Sir Patel”. Sir Patel “was

Read More >

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).   The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing

Read More >

Keeping the Zombies out

The continuing spread of botnets poses a new challenge for online and mobile application designers. Malware-infected machines often have code installed to log keystrokes, steal information, or even initiate background actions without the user’s knowledge. As designers, how do you ensure that the user really is who they say they

Read More >

Compromised Yahoo accounts spread Android malware

The surest way to know that an attack method is working for a malware gang is seeing the method repeated over a period of several months. In Commtouch’s October Trend Report we described an attack targeting Android users. Last week saw a repeat of the attack with a few refinements.

Read More >

Election of New Pope used as Lure in Malware Attacks

It’s tough being a malware distributor – you can’t exactly go around asking people to install your malware – you need to be creative. So a global newsstory such as the election of Pope Francis is too good an opportunity to pass up. The attack, launched a few days after

Read More >

Sometimes guards, guns, and gates are not enough!

Earlier in my career I spent several years working in the physical security sector, working on advanced detection technologies. Since I joined Commtouch, I have been surprised by how many parallels there are between the physical and logical security sectors. Both are founded on ’hardening’ your perimeter to ensure that

Read More >

Preventing Outbound Spam and Blacklisting

Blocked IP ranges resulting in customer loss, operational cost increases, brand damage and even potential lawsuits are potential negative consequences service providers face as a result of spam, phishing and malware emails emanating from their networks. But where does outbound spam come from? Outbound spam emails coming from service provider

Read More >

Over 178,000 Android malware samples seen in January

The Android OS is now installed on hundreds of millions of devices. In Q3 2012 alone, 122 million Android devices were sold, compared to 60 million for the same period in 2011 (Gartner – November 2012). Cybercriminals have clearly taken notice of the huge number of devices, as evidenced by

Read More >