of 172 page(s)
How can they misuse thee Google - Let us count the ways.. (Part 3)
May 6, 2010
Google birthday scam: The email features standard scam elements but what caught our collective eye is that the huge "winnings" are distributed by Google themselves in honor of their 12th anniversary.
According to our calculations the 12th anniversary will actually be in September this year. Google typically celebrates anniversaries by changing the search logo on the day - see 11th birthday logo below. We will be watching for Google birthday spam closer to the time.
How can they misuse thee Google - Let us count the ways.. (Part 2)
May 5, 2010
In Google's words, "Google Sites is a free and easy way to create and share webpages". Of course there are loads of spammers seeking free webhosting for the usual pharmaceuticals, replicas and porn sites.
How can they misuse thee Google - Let us count the ways.. (Part 1)
May 4, 2010
Being the number one name on the Web and also offering so many useful services naturally attracts misuse by the shadier side of the Internet.
We've written in the past about the abuse of google docs and spreadsheets. And in our Q1 trend report we discussed the high percentage of spam emails with forged sender addresses showing Gmail. But wait... there's more. In this series we discuss 3 more examples where the legitimacy and trust conferred by the Google name has been misused...
Spammers aren't Tinkerbell; Identity Theft Takes the Disney Magic Out of the Magic Kingdom
April 27, 2010
Scammers aren't above using the most trusted brands to con you out of money. This scam allows spammers to whistle while they work - all the way to the bank. This time, they are offering "free" Disneyland tickets.
The email explains that the free tickets you signed up for a few months ago were shipped to the wrong address. It directs you to a URL requesting your name, address, and many other personal details. Once you submit these you are informed that your information is being processed (it sure is...). Of course, you don't get the tickets, and they do get a vacation, thanks to your trust in the Disney brand.
CNN redirect exploited by scammers
by Avi Turiel
April 6, 2010
By now you know not to believe those emails promising overnight wealth with very little effort - right? Seriously.
These spam campaigns apparently still attract enough clickers. The subjects in a recent outbreak were typically bold and the emails featured short one-liners promising work-from-home riches. The clever touch was providing a link that exploits redirect functionality supported by CNN's ad servers.
Spammers have given up!
by Avi Turiel
March 4, 2010
No, not really - but a recent outbreak seems to use no technique at all to get recipients to click on a link to a malware-hosting site.
The links lead to sites requiring "the latest version of Macromedia Flash Player". Clicking on the download link or simply loading the page gets you free malware and an all-expenses-paid trip to the nearest botnet. Serves you right for not knowing that Macromedia was acquired by Adobe over 4 years ago.
MP3 spam spreads holiday cheer
December 25, 2009
Commtouch Labs reported a recent attack involving MP3 messages. The email body and subject line were blank, as seen below, and each message had an MP3 attached
While the emails were all subject-less, the MP3s were creatively named. File names include: beauteously, unsecularise, sporicide, cookshack, teentsier, muftis, zoogeography and squishiness.
Sourceforge Wiki Demonstrates User Generated Content Threat | Commtouch Café
July 9, 2009
Sourceforge.net is one of the most well-respected technology download sites on the Internet, as evidenced by its Google page rank of 9 (out of possible 10), and the fact that it is ranked among the top 200 sites according to Alexa. However, recently Sourc
One of Sourceforge's subdomains is a wiki that allows users to add their own relevant content. Apparently some spammers saw this as an opportunity to do some search engine bombing. They filled up pages of the wiki with pornographic keywords, with links to their pornography pages (see screenshot below). The keywords and links are designed to leverage a highly ranked site (e.g. Sourceforge) to provide inbound links to their pornography site, causing it to rank highly in search engines as well.
Better Security through Software
by Jake Brill
January 12, 2010
One of the best defenses against security threats is a good offense, and we want to help you take the offensive by having the latest security software installed on your computer...
NSA Collects 'Word for Word' Every Domestic Communication
by Mary Theroux
August 5, 2013
It has been interesting to me that the most frequent question that I have been asked in the aftermath of our, "Civil Liberties and Security in an Age of Terrorism," is regarding my description of our cell phones as a government listening device.
Even though the information that U.S. surveillance agencies can remotely turn on any cell phone and use it as a listening device for conversations in its vicinity has been available for many years, this is apparently news to many-and news they are reluctant to accept. As previously posted here and elsewhere, the government is spying on you, using your own cell phone and computer, and their drones, and they are storing every communication indefinitely.
Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.