Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Avoiding Facebook phishing

The page below was flagged by Commtouch’s GlobalView URL Filtering as a phishing page yesterday. While we admire the authentic look of the page, there are several pointers that give this away as a phishing site (genuine Facebook login page is provided at the bottom of the post for comparison).

Read More >

e-Cigarettes – the new Viagra for spammers?

From Wikipedia: An electronic cigarette, or e-cigarette, is an electrical device that attempts to simulate the act of tobacco smoking by producing an inhaled mist bearing the physical sensation, appearance, and often the flavor and nicotine content of inhaled tobacco smoke. The device uses heat, or in some cases ultrasonics,

Read More >

500 free credits from Facebook – malware

There’s no such thing as a free lunch – or free Facebook credits. As proof consider the attack described below which has several stages: 1) Users get messages with offers of “free Facebook credits”   2) These trick users into running a malicious JavaScript 3) The infected user is lead to

Read More >

FedEx used for continued email malware – Zombies up 70%

It’s been almost one month since we reported about the huge increase of email-borne malware attachments. The outbreaks have continued on an almost daily basis since then and we have noted a corresponding dramatic increase of over 70% in the number of zombies.  The traffic graph below shows the continued

Read More >

More fake Twitter emails lead to Easter “specials”

It’s been over a month since we wrote about fake Twitter email messages, and if it worked once for scammers/spammers, they’ll certainly try it again. Commtouch labs is seeing large quantities of – you guessed it – fake Twitter email messages, similar to the one here:  How can the uninitiated

Read More >

April 2011 Internet Threats Trend Report

Statistics related to spam levels feature prominently in this Internet Threats Trend Report, as they did in the report about the fourth quarter of 2010. This is due to the wide variations observed during the first three months of 2011, and the takedown of the Rustock botnet – which we

Read More >