Category Archives: Cloudmark

Android Worms And How To Prevent Them

Recently, a malware attack in China infected around 100,000 Android devices in a few days. FireEye described the attack in their blog, and christened it XXShenqi. They call it a phishing attack, but I prefer the term worm, in that infected devices sent SMS messages to the owner’s contact list attempting to convince them to […]

Black Hat/Defcon 2014: Hacking the Internet of Things, and Things not on the Internet

Security researchers have been talking a lot lately about the Internet of Things: the refrigerator that was unfairly suspected of sending spam, the light bulbs that display your WiFi network password, and so on. There were some fine examples of this at Black Hat and Defcon this year. Jesus Molina was staying in a luxury […]

Black Hat 2014: Why I Hate Free Stuff

I was watching an excellent presentation by Rob Ragan and Oscar Salazar when I realized that I hate free stuff. Not of course the free stuff that I use, I’m fine with that. It’s all the free stuff that spammers and other cyber criminals exploit that ticks me off. Let me explain what Ragan and […]

Black Hat 2014: Google Products Might be Watching… Maliciously

Both Android and wearable device security have been a common topic among talks at Black Hat this year, and it seems Google may have passed on some unintentional headaches in both arenas. Jeff Forristal of Bluebox spoke on worrisome security practices used by Android that affected all Android users since January of 2010. Dubbed “FakeID,” […]

Black Hat 2014: Cellular modem vulnerabilities threaten mobile users

Mobile broadband modems are small USB sticks that connect a computer to the internet through a cellular network. The great convenience of being able to stay connected outside of areas with Wi-Fi has led to over 100 million of these devices being sold. However, security flaws in these ubiquitous modems may become a boon for cybercriminals. […]

How Spammers are Abusing Twitter’s t.co URL Shortener

URL shorteners such as bit.ly, goo.gl, and t.co have long been used by spammers. They provide an unlimited source of different URLs which can be used in emails to disguise the final landing page. The major companies providing this service all have anti-abuse filters in place to attempt to control this sort of malicious activity. […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2014 Cloudmark, Inc.