Blog

Insights on Data Security & Threat Intelligence

Spammer marketing from “Spam Center Flow’

Even spammers need to do marketing – the email below (translated from Russian) advertises a spam (sorry, “direct emailer”) group called “Flow”. See previous blog post with a similar example that included costs.  Spam Center “Flow” welcomes you!  That was over the summer, it’s time to leave and the active,

Read More >

Shopping in my sleep? No, just malware.

I received my confirmation email from Athleta so quickly, I didn’t even remember placing the order. But I was intrigued by the possibility of my having ordered a long list of great-sounding swimwear and summer clothes from Athleta without even realizing it. Am I that addicted to e-commerce that I

Read More >

The Commtouch compromised account survey

(For more info about this topic see our previous post.) We’d like to hear your story so we can get a better picture of how compromised accounts happen, what the bad guys do with the accounts, and how people react. Of course we’ll publish the results as soon as we

Read More >

Step 1 – infect millions of computers. Step 2 – ?

Someone somewhere is trying hard. The “someone” is a cybercriminal or organization, and since the 8th of August they have been trying hard to infect millions of computers worldwide. The purpose of this vast computing force is still not clear.  The attacks of the last month have made extensive use

Read More >

Barrack Obama says you can now withdraw $4,500,000

Email text: Attn.  It is my pleasure to inform you that the latest de=elopment regarding the news from the President of United State of America =Barrack Obama) to release all foreign transaction without any further dela=.The United Nations in conjunction with Federal Investigation Department /=The U.S.A Government do here by

Read More >

Updated – Incorrect hotel charges – install malware for refund

Following the UPS and “map of love” outbreaks of the last few weeks, today saw further large amounts of email-attached malware. Today’s emails taunt recipients with claims of incorrect hotel charges that can only be remedied by opening an attached file. Some recipients will no doubt want to correct the

Read More >

We are WRITHING to know

I got such a chuckle out of this message I had to share it. There is a whole new field opening up of how to handle people’s online presence after death (for example this Mashable post), however I would bet that sending the type of message below isn’t considered one

Read More >