Subscribe to RSS Feed

Cloudmark Blog

Intelligence Briefings from the War on Spam

Black Hat 2014: Why I Hate Free Stuff

Thu, Aug 07, 2014 by Andrew Conway

I was watching an excellent presentation by Rob Ragan and Oscar Salazar when I realized that I hate free stuff. Not of course the free stuff that I use, I’m fine with that. It’s all the free stuff that spammers and other cyber criminals exploit that ticks me off. Let me explain what Ragan and […]

Black Hat 2014: Google Products Might be Watching… Maliciously

Wed, Aug 06, 2014 by Tom Landesman

Both Android and wearable device security have been a common topic among talks at Black Hat this year, and it seems Google may have passed on some unintentional headaches in both arenas. Jeff Forristal of Bluebox spoke on worrisome security practices used by Android that affected all Android users since January of 2010. Dubbed “FakeID,” […]

Black Hat 2014: Cellular modem vulnerabilities threaten mobile users

Wed, Aug 06, 2014 by Aaron Lehmann

Mobile broadband modems are small USB sticks that connect a computer to the internet through a cellular network. The great convenience of being able to stay connected outside of areas with Wi-Fi has led to over 100 million of these devices being sold. However, security flaws in these ubiquitous modems may become a boon for cybercriminals. […]

Black Hat 2014: Russian Spammers Compromise 420,000 Websites

Wed, Aug 06, 2014 by Andrew Conway

Just in time for the Black Hat convention, the New York Times is reporting the discovery by Hold Security that a team of Russian Hackers have collected a total of 1.2 billion user names and passwords from 420,000 different websites, along with 542 million email addresses. Although this dwarfs the Target breach in sheer volume, […]

How Spammers are Abusing Twitter’s t.co URL Shortener

Wed, Aug 06, 2014 by Andrew Conway

URL shorteners such as bit.ly, goo.gl, and t.co have long been used by spammers. They provide an unlimited source of different URLs which can be used in emails to disguise the final landing page. The major companies providing this service all have anti-abuse filters in place to attempt to control this sort of malicious activity. […]

The importance of being identifiable

Mon, Jul 28, 2014 by James Hoddinott

One of the technical pitfalls that many senders face surrounds the rDNS of an IP address. rDNS (also referred to as reverse DNS or a PTR record) is the friendly hostname that an IP address maps to and, from a human point of view, can be used to more easily identify a connection. Generally speaking, […]

Advanced Fee Scam by Phone

Fri, Jul 25, 2014 by Andrew Conway

I recently got a phone call telling me that I had been randomly awarded a $95,000 US government grant. Judging from the accent of the caller and the background noise I think it came from a boiler room operation in India somewhere, possibly the same one that keeps calling me to try to persuade me […]

Glide video messaging app continues to generate high levels of SMS spam complaints

Thu, Jul 24, 2014 by Brock Henry

Earlier this year we were seeing a number of reports of SMS spam related to Glide.me, which is a mobile video messaging app. Tried video texting? http://i.glide.me/join Ready for Glide? http://i.glide.me/join Seen Glide? http://i.glide.me/join Tried video texting? http://i.glide.me/join Glide.me has had a history of spam, including where the admitted that they were spamming and would […]

Apple SMS phishing and the iCloud

Tue, Jul 22, 2014 by Andrew Conway

Just last night, I upgraded my Mac Air to the latest release of OSX. The upgrade did not go as smoothly as most. When rebooting, my computer hung for a couple of hours with the screen saying Restarting . When I finally got bored with this and held down the power key for a hard […]

Cloudmark’s 2014 Q2 Global Messaging Threat Report

Wed, Jul 16, 2014 by Tom Landesman

Spammers and attackers in both email and SMS were quick to redouble their efforts this quarter. In our 2014 Q2 Global Messaging Threat Report, we take a look at some of these various new trends popping up around the world. Comically, email phishers were quick to exploit the Heartbleed exploit without using the exploit. Deploying […]


Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2014 Cloudmark, Inc.