Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Updated – Incorrect hotel charges – install malware for refund

Following the UPS and “map of love” outbreaks of the last few weeks, today saw further large amounts of email-attached malware. Today’s emails taunt recipients with claims of incorrect hotel charges that can only be remedied by opening an attached file. Some recipients will no doubt want to correct the

Read More >

We are WRITHING to know

I got such a chuckle out of this message I had to share it. There is a whole new field opening up of how to handle people’s online presence after death (for example this Mashable post), however I would bet that sending the type of message below isn’t considered one

Read More >

The map of love leads to trouble

In mid-August we covered a huge email-malware outbreak that mostly included UPS-themed emails. The same malware continues to be distributed as Fedex confirmations, but also as the “map of love”. The “map of love” attachments accompany emails promising “tourists” a map of interesting destinations worldwide.  Some variations of the text:

Read More >

Facebook friends that you don’t need

Commtouch labs has picked up a wave of phony Facebook friend request emails. Strangely, these all feature random Middle-Eastern/Asian names (not linked to actual Facebook accounts). Note that these requests arrive via email – not Facebook. Following any of the links leads to a malware download reported to be a

Read More >

Welcome to Android Malware

Android malware has been around for a while now, but it has been somewhat uncertain how prevalent infected devices are. The Wildlist has been used as a measure to show which viruses are prevalent. What is interesting about the first Extended Wildlist in August 2011 is the inclusion of three

Read More >

Changes in the Wilderness

The Wildlist is a list of viruses that is maintained by the Wildlist Organization. The intent is to have a list of viruses that is representative of what is really out in the Wild (Antivirus vendors’ name for what our customers will face). The list of viruses is provided by

Read More >

What is antivirus software, Part 3?

I seem to be asking this question a lot. I have already written one article and one previous blog entry on this subject. It is an important question: Millions of people are using antivirus and probably every piece of data on this planet has been processed at least once through

Read More >