Archive for the ‘Cloudmark’ Category

The Snappening: Mostly Harmless

Monday, October 20, 2014 by Andrew Conway

As I reported in a previous post, the hacked SnapChat collection known as the Snappening contains very few nude photos, and most of those do not show an identifiable face. I was asked to quantify this, so I took a random sample of 1,000 photos from the collection and categorized them. To respect the privacy […]

A DNS cache-busting technique for DDOS-style attacks against Authoritative Name Servers

Tuesday, October 07, 2014 by Emmet Cassidy

During the course of a recent analysis of DNS traffic at a customer site, I noticed a high volume of requests had been made for a relatively small set of domains. As it turned out, the traffic was part of an attack on the customer’s DNS infrastructure; however, the point of these requests was initially […]

DNS Gang Wars of the Wild Wild East

Tuesday, October 07, 2014 by Tom Landesman

What does running the DNS infrastructure of a major ISP have in common with operating an online gambling site based in China? If you are running DNS operations of any scale then you are almost certainly participating in a world wide racketeering campaign specifically targeting online gambling sites, many of which operate out of China […]

DNS Tunneling (Ab)Uses

Tuesday, October 07, 2014 by Tom Landesman

Abuse of global DNS infrastructure for the purpose of distributed denial-of-service (DDoS) attacks on various Internet services has been a hot topic in the news for some time now. But there is another unintended use of DNS that can be exploited for a wide range of purposes: DNS tunneling. These purposes can range from benign […]

BitTorrent Sync is the Preferred Method for Sharing Stolen Celebrity Photos

Monday, October 06, 2014 by Andrew Conway

As a fourth wave of stolen celebrity nude photos and videos is being distributed on the Internet, lawyers for some of the affected celebrities are suing Google for making it too easy to find their stolen images. However, the more savvy voyeurs are not using Google to search for the latest leaks, they are simply […]

True Names and Identity on the Internet

Wednesday, October 01, 2014 by Andrew Conway

As received by: Transceiver Relay03 at Relay Language path: Firetongue->Cloudmark->Triskweline, SjK units [Firetongue and Cloudmark are High Beyond trade languages. Only core meaning is rendered by this translation.] From: Arbitration Arts Corporation at Firecloud Nebula [A High Beyond military[?] organization. Known age ~100 years] Subject: Reason for concern Cloudmark took its name from a language […]

Virus Bulletin 2014: Leaking data of the quantified self

Tuesday, September 30, 2014 by Emmet Cassidy

Quantify yourself much?  Candid Wüest of Symantec gave a fascinating presentation on the lax security in various wearable devices at the 2014 Virus Bulletin conference in Seattle.  The so-called “quantifiable self” is a trend in gadgetry that most people will be aware of, if not necessarily by name.  Probably the most famous example is the […]

Spammer Using Hacked Websites To Sell Stolen Photographs of Naked Celebrities

Monday, September 29, 2014 by Andrew Conway

A long established porn spammer who uses compromised web servers to host his landing pages has modified his pitch to include copies of the recently released stolen photographs of naked celebrities, including a picture of McKayla Maroney which according to her lawyers was taken before she was eighteen years old, and so could be illegal […]

BREAKING: Emma Watson Nude Photo Threat Claimed To Be From Rantic Marketing, Not 4chan

Tuesday, September 23, 2014 by Andrew Conway

The latest headlines in the stolen celebrity photos story are about the web site EmmaYouAreNext.com, which displays a countdown. This was first publicized by the web site Foxweekly.com which said, “Emma Watson Nude Photos To Be Leaked By 4Chan Hacker?” FoxWeekly has no connection with NewsCorp or Fox News. The EmmaYouAreNext.com website also contained an […]

Leaked photos reveal McKayla Maroney’s home address

Monday, September 22, 2014 by Andrew Conway

Even if you are not a celebrity, you should be concerned about the metadata that may be included in the photos you share on the Internet, deliberately or inadvertently. JPEG photos contain a header known as EXIF information. This may include the data and time the photo was taken, the make and model of camera, […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2014 Cloudmark, Inc.