Blog

Insights on Data Security & Threat Intelligence

Dealing with the “unknown unknowns”

“There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don’t know. But there are also unknown unknowns – the ones we don’t know we don’t know.” Former US Secretary of Defense Donald

Read More >

Email Security SaaS für Sicherheitsanbieter und Service Provider

Heute hat Commtouch (führender Anbieter von Internetsicherheitstechnologien und Cloud-basierten Services) Email Security für SaaS vorgestellt: der neue Service ermöglicht es Security-Anbietern und Service Providern, schnell und kostengünstig mit einer Private-Label-Lösung vom Wachstumsmarkt Security as a Service zu profitieren. Bei Commtouch Email Security SaaS handelt es sich um eine hochleistungsfähige Cloud-basierte

Read More >

“Sicherheit im Beerenanbau” – doppelt unerwünschte Spam-E-Mails

Unerwünscht und ärgerlich – zwei Adjektive, die beim Thema Spam jedem einfallen. Unerwünschte Werbung in Massen im Postfach der E-Mail Nutzer, davor schützt inzwischen ein Spam-Filter. Was jedoch tun, wenn Themen beworben werden, mit denen man gar nichts zu tun hat? So geschehen ist es der Website proberry.de. Seit Mittwoch

Read More >

Pump and dump spam waits for Hurricane Sandy

Even stock scammers needed to put their plans on hold following the closure of stock markets for 2 days. In the typically worded email shown below, recipients are encouraged to buy into low-priced shares now that Hurricane Sandy has passed and trading has resumed. Interestingly, we see less topical spam

Read More >

.com malware pretends to be naughty .com website

Sometimes the “other side” uses a neat trick that seems so obvious. In these cases we think “they must have done this before” – then we search the archives (Google) for proof that it has indeed been used before. A good example is our post from last year where we

Read More >

US Election used as malware smokescreen

At first glance this looked like a “standard” email-malware attack. As with many similar attacks the email pretends to be carrying an eticket attachment – this time from Delta. The zip file holds executable malware. In case we weren’t sure this is malware here are some of the giveaways: The

Read More >

Measuring the success of a malware campaign

We are often asked whether we have any way of knowing how successful a particular malware or spam campaign has been. We assume that the “other side” tracks this sort of thing to see what social engineering works, and which material escapes spam and malware checks. (If any spammer is

Read More >