More spam mail-merge fail
We would love to “find more info here”… We really would! I guess thats why it says “Try“.
Insights on Data Security & Threat Intelligence
We would love to “find more info here”… We really would! I guess thats why it says “Try“.
Most rumors have the iPhone 5 arriving sometime in September. Today we received a malicious email that exploits the hype surrounding the not-so-imminent release. The email describes the “iPhone 5G S” (hope Apple is not taking notes). The text and forged images group together several of the rumors about the
A few weeks ago we blogged about a new spam trend we have noticed that focuses on e-cigarettes. That post contained a spam example in French.
Part of the complete engineering of phishing attacks is the authentic look of the actual phishing site. There are traditional bank phishing pages with simple username, password combinations such as this Lloyds phishing site: But what’s a phisher to do if the authentic site adds more complex features – like
The page below was flagged by Commtouch’s GlobalView URL Filtering as a phishing page yesterday. While we admire the authentic look of the page, there are several pointers that give this away as a phishing site (genuine Facebook login page is provided at the bottom of the post for comparison).
From Wikipedia: An electronic cigarette, or e-cigarette, is an electrical device that attempts to simulate the act of tobacco smoking by producing an inhaled mist bearing the physical sensation, appearance, and often the flavor and nicotine content of inhaled tobacco smoke. The device uses heat, or in some cases ultrasonics,
If you were woken in the middle of the night and told about an annoying false positive you would immediately realize that your spam filter had been a bit over-eager. For many though, spam terminology is a teensy bit confusing. This probably has a lot to do with the naming
Last week we described Facebook malware that was distributed via compromised accounts offering “500 free credits on Facebook”. Now the same techniques are being used but the subject matter has changed to the highly topical death of Osama Bin Laden. As described in the last post the malware cycle is
There’s no such thing as a free lunch – or free Facebook credits. As proof consider the attack described below which has several stages: 1) Users get messages with offers of “free Facebook credits” 2) These trick users into running a malicious JavaScript 3) The infected user is lead to