Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Malware plays on my guilty conscience

Malware marketers have captured my customer scenario: turns out I am the type with a guilty conscience. I will open (and consider real until I snap myself out of it) any email that purports to tell me I’ve done something I probably should not have done, like purchased clothes I

Read More >

Would you like some malware on your Pizza?

$107 for a couple of pizzas and drinks! – I didn’t order this… (especially not the Veggie Lover’s Pizza with chicken topping) There must be some mistake. I’ll click on this “cancel order” link and set things straight…. Our advice is of course not to click. The links redirect to

Read More >

The responsibility to protect children from pornography

The last several months have seen a flurry of activity about protecting children from online pornography. Politicians in England, Ireland and elsewhere have come out in favor of requiring Internet Service Providers to block pornography from their customers, unless they explicitly opt in to access it. This would ensure that

Read More >

Dusty old spam trick used to send dusty old malware

“Your message could not be delivered”. It’s one of the oldest methods in the social-engineering-for spam-and malware-emails handbook. You are receiving notice that an email you sent has not reached its recipient – so sad.  And of course the attachment must contain the mysterious email. But it doesn’t. It contains

Read More >

So now you’re on LinkedIn: What’s next?

By far the most common theme for malware emails over the last few weeks has been “interbank payment rejected” or similar. The emails refer to a cancelled or rejected interbank transaction and are alternatively from:  Electronic Payments Association ACH (Automated Clearing House) NACHA (National Automated Clearing House Association) These are

Read More >

The Effectiveness of DNSBLs in an IPv6 world

It is certain that the future of the Internet communication belongs to the Internet Protocol version 6, or IPv6. Even though some people might think it is new, it’s been around for quite a while; the first document describing basics of IPv6 (RFC 2460) was published in 1998. The protocol

Read More >

Compromised Websites unknowingly host malware

The email shown below is a current example of “payment rejected” emails that have circulated in large numbers in the past 3 weeks. The links in the email lead to malware similar to that described a previous post .  In the example above the malicious JavaScript files were hidden within the

Read More >