Tag Archive | "scam"


14 May 2010 | 8,503 views

Two Thirds Of All Phishing Attacks Carried Out By Single Group

Now this is a pretty surprising figure, we all know Phishing has become a big issue in recent years especially for financial institutions, but it still amazes me two-thirds of all attacks can come from a single group! It’s been a major issue concerning computer security in general, consumer privacy and companies like PayPal have [...]

Continue Reading


28 October 2009 | 6,295 views

Facebook E-mail Spam Conceals Malware Attack

Facebook has had a fair share of problems, being a large community of course it’s going to be a ripe target for spammers, scammers and malware distributors. The latest to hit is a spam e-mail claiming to be from the Facebook team that actually spreads a nasty piece of malware called Bredolab. It’s also been [...]

Continue Reading


24 October 2007 | 3,265 views

The Next Evolution – GFI Uncovers MP3 Spam

If you remember a while back we mentioned PDF & Image Attachment Spam – The New Problem with E-mail, now we have another ‘innovation’ in spamming.. MP3 spam! It seems they are using it for the same old pump and dump tactics (Microcap stock fraud) to artificially inflate stock prices then sell out fast. Spammers [...]

Continue Reading


06 February 2007 | 5,192 views

Spam on the Increase – Image Spam Accounting for More

As always, spam filters get better and smarter, but so do spammers..and frankly spammers have more to gain by beating the spam filters so they always work harder and think in more innovative ways. As they get their spam resembling real emails more and more, the spam filters become less accurate. On top of that [...]

Continue Reading


13 January 2007 | 7,620 views

Rock Phish Group Accounts for 50% of Online Scams?

It seems common in most things, and it’s the same in infosec and especially malware, phishing and spam. The majority of malware, phishing attacks and spam mails are coming from the same few sources, I’d say it’s a case of 80/20. 20% of the people are sending 80% of the messages, one of the big [...]

Continue Reading


30 October 2006 | 7,100 views

Anti-Spyware Groups Still Require Legislation

Cyber and computer laws are always a grey area, they tend to be very vague and don’t cover specific technologies. Spam is a good example, look at how long we’ve been getting spammed, and it’s been a SERIOUS problem for at least the last 5 years, spam legislation has only started coming in to effect [...]

Continue Reading


20 March 2006 | 8,908 views

FrSIRT Starts Charging for OTHER Peoples Work (Exploits)

Is it ethical or even legal to charge for other peoples work? As far as I know France seems have some pretty strong (and weird) copyright laws. And yes, they are blaming French Laws prohibiting full disclosure. In conformity with applicable French laws prohibiting Full-disclosure, the FrSIRT will no longer distribute exploits and PoCs on [...]

Continue Reading


01 March 2006 | 17,291 views

Should Social Engineering be a part of Penetration Testing?

This is actually a very interesting debate. Just to introduce if you don’t know.. What is Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. The process involves an active analysis of the system for any weaknesses, technical [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·