Category: Blog

Strong Increase in Regionalized Spam and Malware Distribution

The second quarter of 2013 saw a decrease in global spam levels while spam levels varied significantly according to region, indicating that spam distribution is becoming more and more targeted. These are the results of the Q2 Internet Threats Trend Report issued by Commtouch. During the second quarter, as measured

Real-Time Spam Delivers a Royal Baby

It isn’t exactly new: spammers and malware distributors love current events that draw a lot of public attention. They use them and the public interest for their campaigns to lure curious recipients into doing things they might not usually do: click on links or open attachments. So it fits their

Malware Campaign in the Name of Wells Fargo

For Commtouch’s email security labs, phishing emails allegedly coming from well-known large consumer banks are a common sight. A little less common is the campaign we saw in the last 24 hours: Containing the subject line “IMPORTANT Documents – WellsFargo”, emails coming from the addresses service@wellsfargo.com or docs@wellsfargo.com did not

Stuck in the Philippines (or wherever)…

Since I started working in the security industry I have trained those around me to be wary of unusual looking emails – even those coming from friends. So I felt glad when a friend (‘trained” by me) forwarded this email which she recognized as a scam. It’s the usual “traveler

Resilient Network Systems Selected as a Red Herring Top 100 North America Tech Startup

San Francisco, CA – June 3, 2013 – Resilient Networks Systems, the leader in Trust Management, was named to theRed Herring Top 100 during the annual conference held in Monterey on May 21-23, 2013. The award recognizes the leading private companies in North America, celebrating their innovations and technologies across their respective

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).  The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing page