Feedback loops in the fight against spam
Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …
Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …
A new spam campaign impersonating the popular mail service DHL Express is currently underway, warn Bkis researchers. The email in question looks like this: Once the user …
Facebook scammers are sure to take advantage of every feature that the social network offers and that can be exploited to propagate their scams. The latest one employes the …
Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering …
IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …
Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …
Japan’s seemingly unending series of misfortunes has so far generated a vast variety of online scams. The latest one includes spam emails containing Excel attachments …
We are all aware that IP addresses have almost run out. Security experts are debating the pros and cons, but the sad fact is the migration towards IPv6 is inevitable. Now it …
Robert Soloway, one of the most prolific spammers whose activities earned him the nickname Spam King, has been released from prison after a little less than 4 years inside. He …
Attackers are making a shift from using e-mail spam to more aggressively targeting the Internet, according to Barracuda Network. E-mail spam dropped by half during 2010, while …
Barracuda Labs analyzed more than 26 million Twitter accounts in order to measure and analyze account behavior. The analysis enabled researchers to model normal user behavior …
An analysis of SMS traffic conducted from March through December 2010 reveals that according to the reports of misuse submitted by AT&T, Bell Mobility, KT, Korean …