Read more about spam
Bookmark and Share
  • There's a new banking Trojan in town

    17.06.2014

    A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning.

  • Most comment spam traffic is generated by 28% of attackers

    09.06.2014

    Imperva released its June Hacker Intelligence Initiative report, which presents an in-depth study of how a relatively small number of attack sources are responsible for the majority of comment spam traffic.

  • Relations between spam landscape actors can be leveraged for detection

    04.06.2014

    Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors in the spam ecosystem, in the hope of providing information about bottlenecks and critical points in the spamming pipeline that will aid anti-spam efforts.

  • Dissecting April's malicious spam

    30.05.2014

    Malicious attachments in April came disguised as e-greetings and notifications about faxes.

  • Why Google prefers numeric CAPTCHAs

    12.05.2014

    Alphanumeric CAPTCHAs - those more or less difficult-to-read combinations that are used by many online services to discern whether a user is human or a bot - have been in use for over 15 years now, but I've yet to meet a person who likes "solving" them.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //