Category: cyren

Building Your Digital Profile, Piece by Piece…

Livingsocial.com, the daily deals site was hacked last week, with details for over 50 Million accounts, including Customer Names, Emails, Birthdates and Encrypted Passwords being stolen. This event comes at a difficult time for the company, as they attempt a corporate comeback having recently received an infusion of cash from

Poetry Spam: A Sole Act of Charity

Last week I received an email from Rina Patel (although her email address implies “Daniel” as first name), subject: “Kindly Assist”. Rina is from Japan (although her/ Daniel’s email address is from Uruguay) and was married to an English man from the UK, called “Late Sir Patel”. Sir Patel “was

Shameless malware distribution abuses Texas explosion and Boston Marathon Attack

Malware distributors are turning to recent events to get recipients to follow links to infected websites. The recent “Pope-themed” malware attack is one such example. The attacks at the Boston Marathon and the explosion at a Texas fertilizer plant have been quickly exploited with large quantities of emails sent out

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).   The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing

Keeping the Zombies out

The continuing spread of botnets poses a new challenge for online and mobile application designers. Malware-infected machines often have code installed to log keystrokes, steal information, or even initiate background actions without the user’s knowledge. As designers, how do you ensure that the user really is who they say they

Compromised Yahoo accounts spread Android malware

The surest way to know that an attack method is working for a malware gang is seeing the method repeated over a period of several months. In Commtouch’s October Trend Report we described an attack targeting Android users. Last week saw a repeat of the attack with a few refinements.

Election of New Pope used as Lure in Malware Attacks

It’s tough being a malware distributor – you can’t exactly go around asking people to install your malware – you need to be creative. So a global newsstory such as the election of Pope Francis is too good an opportunity to pass up. The attack, launched a few days after

Sometimes guards, guns, and gates are not enough!

Earlier in my career I spent several years working in the physical security sector, working on advanced detection technologies. Since I joined Commtouch, I have been surprised by how many parallels there are between the physical and logical security sectors. Both are founded on ’hardening’ your perimeter to ensure that

Preventing Outbound Spam and Blacklisting

Blocked IP ranges resulting in customer loss, operational cost increases, brand damage and even potential lawsuits are potential negative consequences service providers face as a result of spam, phishing and malware emails emanating from their networks. But where does outbound spam come from? Outbound spam emails coming from service provider

Over 178,000 Android malware samples seen in January

The Android OS is now installed on hundreds of millions of devices. In Q3 2012 alone, 122 million Android devices were sold, compared to 60 million for the same period in 2011 (Gartner – November 2012). Cybercriminals have clearly taken notice of the huge number of devices, as evidenced by