Results for 'spam'
Hoaxes
March 25, 2013 - A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we...
Internet everywhere and poor security practices: a disaster in the making?
March 22, 2013 - We often hear about botnets (networks of infected computers) being used to send out spam, perform Distributed Denial of Service attacks...
Tools of the Trade: Exploit Kits
February 11, 2013 - Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide. Exploit...
Malwarebiter – Biting down on you
January 30, 2013 - UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst...
Web Exploits: a bright future ahead
January 2, 2013 - The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could...
Misleading advertising
December 20, 2012 - Today we are going to be talking about advertising, specifically misleading advertising. Whether it’s on TV or on the internet, in...
It’s The Most Dangerous Time of the Year!
November 30, 2012 - The holidays are a time for family, friendship, giving and compassion. They are also a time for cyber criminals to scam...
Timely detection: the key to a good anti-malware solution
October 22, 2012 - In this connected world, time is of the essence. The bad guys are counting on releasing their malicious programs and infecting...
Call Me Phishy
September 7, 2012 - A few months ago, I did a series on Phishing, called Phishing 101. In it, I described various ways in which...
The Malware That I Used To Know
July 25, 2012 - Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator...