Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Loads of phony twitter emails

Commtouch Labs has detected large volumes of phony “unread twitter message” emails. All links route via intermediate sites to the same pharmacy site. Most of the links are being flagged in browsers as malware or (incorrectly) phishing. Our advice – mouse over any email links if you aren’t sure about

Read More >

How to scale phishing by using the cloud

Consider for a moment the stages involved in a traditional phishing attack:  Create the phishing page – either buried within a legitimate site or hosted on some temporary server Send out carefully socially engineered phishing emails requiring login for some reason – including the link to the phishing page Collect

Read More >

Outbound spam – what’s the problem?

Almost a year ago Commtouch released its Outbound Spam Protection (OSP) for Service Providers. Since then, I have been involved in numerous installations of the system and I would like to share my experience so far. If you asked me to describe it in just 2 words, I would say

Read More >

Free hosting of spam content on forum sites

Like any good scammer, spammers are always looking for ways around the system, knowing that their spam will be blocked if it contains the real URL they are trying to promote (in this case “russian-babes.ru”).  In this example, they are using a workaround to fight both real-time anti-spam protection and

Read More >