Virus Bulletin 2014: Leaking data of the quantified self

Tue, Sep 30, 2014 by Emmet Cassidy

Quantify yourself much?  Candid Wüest of Symantec gave a fascinating presentation on the lax security in various wearable devices at the 2014 Virus Bulletin conference in Seattle.  The so-called “quantifiable self” is a trend in gadgetry that most people will be aware of, if not necessarily by name.  Probably the most famous example is the […]

The Impact of Shellshock

Mon, Sep 29, 2014 by Andrew Conway

Shellshock has been getting a lot of press as the worst security bug ever, but while it is terribly embarrassing for the open source movement, I believe the real world impact will be fairly limited. The bug is a fundamental flaw in bash, the command line interface on most Linux and Mac machines. (For once […]

Spammer Using Hacked Websites To Sell Stolen Photographs of Naked Celebrities

Mon, Sep 29, 2014 by Andrew Conway

A long established porn spammer who uses compromised web servers to host his landing pages has modified his pitch to include copies of the recently released stolen photographs of naked celebrities, including a picture of McKayla Maroney which according to her lawyers was taken before she was eighteen years old, and so could be illegal […]

BREAKING: Emma Watson Nude Photo Threat Claimed To Be From Rantic Marketing, Not 4chan

Tue, Sep 23, 2014 by Andrew Conway

The latest headlines in the stolen celebrity photos story are about the web site EmmaYouAreNext.com, which displays a countdown. This was first publicized by the web site Foxweekly.com which said, “Emma Watson Nude Photos To Be Leaked By 4Chan Hacker?” FoxWeekly has no connection with NewsCorp or Fox News. The EmmaYouAreNext.com website also contained an […]

Leaked photos reveal McKayla Maroney’s home address

Mon, Sep 22, 2014 by Andrew Conway

Even if you are not a celebrity, you should be concerned about the metadata that may be included in the photos you share on the Internet, deliberately or inadvertently. JPEG photos contain a header known as EXIF information. This may include the data and time the photo was taken, the make and model of camera, […]

Celebrity Nudes and iCloud Phishing

Thu, Sep 11, 2014 by Andrew Conway

The recent leak of celebrities personal photographs demonstrates just how weak our defenses are against determined attackers. From the internal evidence and the chatter on 4chan and Reddit, it does not look as if this was the result of a single attack or a single hacker. Various sources say that there was a ring of […]

Phishing in the iCloud and Vegas

Wed, Sep 10, 2014 by Tom Landesman

Up noticeably this month, a new form of broader bank phishing attacks seems to be targeting various parts of the U.S. including Las Vegas where 63 percent of all reported SMS spam turns out to be bank phishing. The trend continued during the finals days of August as an average 46 percent of all reported […]

Android Worms And How To Prevent Them

Wed, Sep 03, 2014 by Andrew Conway

Recently, a malware attack in China infected around 100,000 Android devices in a few days. FireEye described the attack in their blog, and christened it XXShenqi. They call it a phishing attack, but I prefer the term worm, in that infected devices sent SMS messages to the owner’s contact list attempting to convince them to […]

ICO Raid on Suspect Call Center

Wed, Aug 27, 2014 by Cloudmark

It’s been just a few months since the UK’s Information Commissioners Office (ICO) took down its last target — using UK mobile users reports to 7726. Last week though, the regulator struck yet another blow against spam SMS texting. This time the ICO raided a claims management call centre in the Welsh town of Llanelli. […]

The Cost of Beating Automated Turing Tests

Tue, Aug 19, 2014 by Andrew Conway

Most social networks and other free Internet services have some sort of verification in their sign up process to make sure that a real person is signing up, and not a bot. Spammers and other cyber criminals wishing to abuse the service will attempt to automate this process so that they can sign up for […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2014 Cloudmark, Inc.