More e-Cigarette spam
A few weeks ago we blogged about a new spam trend we have noticed that focuses on e-cigarettes. That post contained a spam example in French.
Insights on Data Security & Threat Intelligence
A few weeks ago we blogged about a new spam trend we have noticed that focuses on e-cigarettes. That post contained a spam example in French.
Part of the complete engineering of phishing attacks is the authentic look of the actual phishing site. There are traditional bank phishing pages with simple username, password combinations such as this Lloyds phishing site: But what’s a phisher to do if the authentic site adds more complex features – like
The page below was flagged by Commtouch’s GlobalView URL Filtering as a phishing page yesterday. While we admire the authentic look of the page, there are several pointers that give this away as a phishing site (genuine Facebook login page is provided at the bottom of the post for comparison).
From Wikipedia: An electronic cigarette, or e-cigarette, is an electrical device that attempts to simulate the act of tobacco smoking by producing an inhaled mist bearing the physical sensation, appearance, and often the flavor and nicotine content of inhaled tobacco smoke. The device uses heat, or in some cases ultrasonics,
If you were woken in the middle of the night and told about an annoying false positive you would immediately realize that your spam filter had been a bit over-eager. For many though, spam terminology is a teensy bit confusing. This probably has a lot to do with the naming
Last week we described Facebook malware that was distributed via compromised accounts offering “500 free credits on Facebook”. Now the same techniques are being used but the subject matter has changed to the highly topical death of Osama Bin Laden. As described in the last post the malware cycle is
There’s no such thing as a free lunch – or free Facebook credits. As proof consider the attack described below which has several stages: 1) Users get messages with offers of “free Facebook credits” 2) These trick users into running a malicious JavaScript 3) The infected user is lead to
It’s been almost one month since we reported about the huge increase of email-borne malware attachments. The outbreaks have continued on an almost daily basis since then and we have noted a corresponding dramatic increase of over 70% in the number of zombies. The traffic graph below shows the continued
How advance-fee-fraud works: You think you’ll make money by helping Suzanne Mubarak – all you want is a small cut of the $2 Billion she wants to get out. After making contact though, you will have to pay some fees for “unexpected” items such as customs clearance, registration, banking charges,