Targeted attacks increase as spam continues to fall
Targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in …
Gold-themed spam fishing for personal information
It is almost a rule of thumb that everything that might interest a large number of people makes for a good lure for spammers and scammers. From news regarding natural …
IT teams still struggling with spam and viruses
IT teams are still struggling to protect their businesses from spam email and viruses, according to Mimecast. Their research also finds that the majority of organizations are …
Rise in ZIP file attachments in spam emails lead to Bredolab malware
On the 16th of March Rustock, the largest of the spamming botnets, was taken down. As you would expect, global spam levels started to drop, as can be seen when you look at the …
“Request rejected” spam campaign leads to fake AV
A spam email campaign carrying a malicious attachment designed to download and run a fake AV solution on the recipient’s computer is currently hitting inboxes around the …
Email malware jumps 400% after Rustock takedown
Malware sent via email increased by 400% in the last week of March 2011, Commtouch reported today. The significant increase was detected two weeks after the takedown of the …
Spam about the Jasmine Revolution leads to malware
By the end of 2010, the total number of Chinese Internet users reached 457 million. That means that even if scammers and hackers concentrate exclusively on that particular …
Feedback loops in the fight against spam
Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …
DHL Express spam campaign leads to fake AV
A new spam campaign impersonating the popular mail service DHL Express is currently underway, warn Bkis researchers. The email in question looks like this: Once the user …
Facebook users spammed through Events feature
Facebook scammers are sure to take advantage of every feature that the social network offers and that can be exploited to propagate their scams. The latest one employes the …
Pharmaceutical spam and mobile threats dominate
Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering …
Vulnerabilities surge: 8,000 recorded in 2010
IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …
Featured news
Resources
Don't miss
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)
- Acrobat Reader zero-day exploited in the wild for many months
- AI agent intent is a starting point, not a security strategy