Archive for the ‘Online Security’ Category

The Snappening: Mostly Harmless

Monday, October 20, 2014 by Andrew Conway

As I reported in a previous post, the hacked SnapChat collection known as the Snappening contains very few nude photos, and most of those do not show an identifiable face. I was asked to quantify this, so I took a random sample of 1,000 photos from the collection and categorized them. To respect the privacy […]

The Snappening: Another Hoax?

Saturday, October 11, 2014 by Andrew Conway

The media are full of reports of a vast leak of private photos and videos that were sent using the SnapChat application. However, it’s looking increasingly likely that they have been taken in by a scammer, and that the actual leak consists of a handful of videos, very few of them compromising. Starting on Thursday, […]

The Impact of Shellshock

Monday, September 29, 2014 by Andrew Conway

Shellshock has been getting a lot of press as the worst security bug ever, but while it is terribly embarrassing for the open source movement, I believe the real world impact will be fairly limited. The bug is a fundamental flaw in bash, the command line interface on most Linux and Mac machines. (For once […]

Defcon 2014: How should home routers get secured?

Monday, August 11, 2014 by Aaron Lehmann

The risk posed by vulnerable home internet routers was a common theme at this year’s Black Hat and DEF CON conferences. These devices are becoming notorious for having security vulnerabilities, which often go unpatched. The SOHOpelessly Broken contest at DEF CON provided a dramatic demonstration of these flaws, as contestants attacked consumer-grade routers and quickly broke into them. But […]

Anti-Virus the Cloudmark way

Monday, May 12, 2014 by Andrew Conway

Symantec is now admitting that traditional anti-virus solutions are losing the war against computer malware, according to a recent article in the Wall Street Journal. “Antivirus is dead,” says Brian Dye, Symantec’s senior vice president for information security. . . . hackers increasingly use novel bugs. Mr. Dye estimates antivirus now catches just 45% of […]

Snapchat Exploit Leads to 4.6 Million Exposed Records

Friday, January 03, 2014 by Tom Landesman

Snapchat may have had less than a happy New Year thanks to the authors of SnapchatDB.info. The site, released on December 31, features approximately 4.6 million Snapchat users’ username, phone number, and area-code-derived geographical region. These records were collected using an exploit published by Gibson Security who has been exploring the undocumented Snapchat API for […]

The Authentication Arms Race

Wednesday, December 18, 2013 by Andrew Conway

At Cloudmark, we have long recognized that we are in an arms race against the spammers. Spammers are continually trying to come up with new techniques for getting through our spam filters, and we are constantly monitoring their activities and staying one step ahead. It seems that the same thing is now happening in the […]

Cloudmark’s Q2 2013 Threat Report

Wednesday, July 24, 2013 by Tom Landesman

Today, Cloudmark has released its Q2 2013 Threat Report, covering recent messaging threats and trends during the past quarter. During the second quarter, fishy dieting offers and suspiciously free cruises made a splash on the SMS side of things. Meanwhile, a substantial uptick suggests compromised web hosting accounts seem to be making waves among seedier […]

How to stop spammers mining your Facebook profile

Tuesday, June 25, 2013 by Andrew Conway

Techcrunch reported this week that an app developer had downloaded thousands of phone numbers from active Facebook accounts.  This technique has been around for a while and Cloudmark has seen it used by spammers to harvest email addresses and phone numbers, and to make both email and SMS spam more personal and more convincing. The […]

Spammers hacking web servers to host porn, send spam

Monday, April 22, 2013 by Andrew Conway

For a long time we’ve been seeing spammers systematically compromising other people’s web sites to use URLs on them to redirect to the spammers landing page. This allows them to have a far greater range of call to action URLs in email spam. A recent attacker is not only using hacked web sites as redirectors, […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2014 Cloudmark, Inc.