Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Loads of phony twitter emails

Commtouch Labs has detected large volumes of phony “unread twitter message” emails. All links route via intermediate sites to the same pharmacy site. Most of the links are being flagged in browsers as malware or (incorrectly) phishing. Our advice – mouse over any email links if you aren’t sure about

Read More >

How to scale phishing by using the cloud

Consider for a moment the stages involved in a traditional phishing attack:  Create the phishing page – either buried within a legitimate site or hosted on some temporary server Send out carefully socially engineered phishing emails requiring login for some reason – including the link to the phishing page Collect

Read More >

Outbound spam – what’s the problem?

Almost a year ago Commtouch released its Outbound Spam Protection (OSP) for Service Providers. Since then, I have been involved in numerous installations of the system and I would like to share my experience so far. If you asked me to describe it in just 2 words, I would say

Read More >

Free hosting of spam content on forum sites

Like any good scammer, spammers are always looking for ways around the system, knowing that their spam will be blocked if it contains the real URL they are trying to promote (in this case “russian-babes.ru”).  In this example, they are using a workaround to fight both real-time anti-spam protection and

Read More >

Reality check – Spam is going up

In January we reported about the sudden increase in spam after a very quiet Christmas New year period. The Christmas lull followed a sustained decrease over the last few months of 2010 leading some to speculate about the future of spam and having “won the war”.  Having watched the trends

Read More >

Plain Vanilla Spam Leads to Beautifully Designed Scam

While our solutions filter out spam before they ever reach mailboxes, we are always on the lookout for how social engineering inspires innocent victims to take action. We were actually intrigued by this slick combination of spam and scam.  As you can see from this image, the spam itself is

Read More >