Read more about spam
Bookmark and Share
  • Most comment spam traffic is generated by 28% of attackers

    09.06.2014

    Imperva released its June Hacker Intelligence Initiative report, which presents an in-depth study of how a relatively small number of attack sources are responsible for the majority of comment spam traffic.

  • Relations between spam landscape actors can be leveraged for detection

    04.06.2014

    Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors in the spam ecosystem, in the hope of providing information about bottlenecks and critical points in the spamming pipeline that will aid anti-spam efforts.

  • Dissecting April's malicious spam

    30.05.2014

    Malicious attachments in April came disguised as e-greetings and notifications about faxes.

  • Why Google prefers numeric CAPTCHAs

    12.05.2014

    Alphanumeric CAPTCHAs - those more or less difficult-to-read combinations that are used by many online services to discern whether a user is human or a bot - have been in use for over 15 years now, but I've yet to meet a person who likes "solving" them.

  • The prime target for malicious emails

    08.05.2014

    In the first quarter of 2014 spammers started imitating messages from mobile applications.




Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //