Read more about spam
Bookmark and Share
  • Relations between spam landscape actors can be leveraged for detection

    04.06.2014

    Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors in the spam ecosystem, in the hope of providing information about bottlenecks and critical points in the spamming pipeline that will aid anti-spam efforts.

  • Dissecting April's malicious spam

    30.05.2014

    Malicious attachments in April came disguised as e-greetings and notifications about faxes.

  • Why Google prefers numeric CAPTCHAs

    12.05.2014

    Alphanumeric CAPTCHAs - those more or less difficult-to-read combinations that are used by many online services to discern whether a user is human or a bot - have been in use for over 15 years now, but I've yet to meet a person who likes "solving" them.

  • The prime target for malicious emails

    08.05.2014

    In the first quarter of 2014 spammers started imitating messages from mobile applications.

  • AOL breach confirmed, bigger than initially thought

    29.04.2014

    Recent spam emails apparently sent from AOL email addresses and hawking diet products are a direct consequence of a breach of the company's networks and systems, AOL has confirmed on Monday.




Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //