Read more about spam
Bookmark and Share
  • Relations between spam landscape actors can be leveraged for detection

    04.06.2014

    Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors in the spam ecosystem, in the hope of providing information about bottlenecks and critical points in the spamming pipeline that will aid anti-spam efforts.

  • Dissecting April's malicious spam

    30.05.2014

    Malicious attachments in April came disguised as e-greetings and notifications about faxes.

  • Why Google prefers numeric CAPTCHAs

    12.05.2014

    Alphanumeric CAPTCHAs - those more or less difficult-to-read combinations that are used by many online services to discern whether a user is human or a bot - have been in use for over 15 years now, but I've yet to meet a person who likes "solving" them.

  • The prime target for malicious emails

    08.05.2014

    In the first quarter of 2014 spammers started imitating messages from mobile applications.

  • AOL breach confirmed, bigger than initially thought

    29.04.2014

    Recent spam emails apparently sent from AOL email addresses and hawking diet products are a direct consequence of a breach of the company's networks and systems, AOL has confirmed on Monday.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //