IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…Spam and phishing in 2016
The year in figures According to Kaspersky Lab, in 2016: The proportion of spam in email flows was 58.31%, which is 3.03 percentage points more than in 2015. 62.16% of spam emails were no more than 2 KB in size. 12.08% of spam was sent from the US. Trojan.Win32.Bayrob was the most popular malware family […] more…Teaching Kids to Rise Above the Twitter Trolls
The social media platform Twitter has been making the headlines every day lately and not for good reasons. The popular 140-character driven network is under fire for its increasingly troll-heavy content and its failure to regulate abusive tweeters. From celebrities shutting down accounts to politicians and special interest groups daily (and very publically) engaged in […] more…Spam and phishing in Q2 2016
Download the full report (PDF) Spam: quarterly highlights The year of ransomware in spam Although the second quarter of 2016 has only just finished, it’s safe to say that this is already the year of ransomware Trojans. By the end of Q2 there was still a large number of emails with malicious attachments, most of […] more…The Rio Olympics: Scammers Already Competing
A few years ago, spammers and scammers were not as interested in the Olympics as they were in football (the World Cup and European Championships). The first major increase in the number of spam messages devoted to the Olympic Games occurred in the run-up to the Winter Olympics in Sochi in 2014. Since then, their […] more…More information
- Practical IT: How your firm can better secure access to social networks
- Google asks US Supreme Court to review ruling on Wi-Fi packet sniffing
- Vulnerability Exposed Blackphone to Complete Takeover
- NSA chief talks surveillance tactics over dinner
- Take the Misaligned #IncentiveQuiz and Win BIG
- FBI busts hacker nest dedicated to Android and Facebook exploits
- Use AnonTwi Twitter client to hide your IP address
- Attackers Exploit vBulletin Flaw to Hack Servers
- Microsoft Internet Explorer CVE-2013-1308 Use-After-Free Remote Code Execution Vulnerability
- Google Confirms an Iranian Group Is Trying to Access Emails Linked to Both US Presidential Campaigns