All posts by Andrew Conway

True Names and Identity on the Internet

As received by: Transceiver Relay03 at Relay Language path: Firetongue->Cloudmark->Triskweline, SjK units [Firetongue and Cloudmark are High Beyond trade languages. Only core meaning is rendered by this translation.] From: Arbitration Arts Corporation at Firecloud Nebula [A High Beyond military[?] organization. Known age ~100 years] Subject: Reason for concern Cloudmark took its name from a language […]

The Impact of Shellshock

Shellshock has been getting a lot of press as the worst security bug ever, but while it is terribly embarrassing for the open source movement, I believe the real world impact will be fairly limited. The bug is a fundamental flaw in bash, the command line interface on most Linux and Mac machines. (For once […]

Spammer Using Hacked Websites To Sell Stolen Photographs of Naked Celebrities

A long established porn spammer who uses compromised web servers to host his landing pages has modified his pitch to include copies of the recently released stolen photographs of naked celebrities, including a picture of McKayla Maroney which according to her lawyers was taken before she was eighteen years old, and so could be illegal […]

BREAKING: Emma Watson Nude Photo Threat Claimed To Be From Rantic Marketing, Not 4chan

The latest headlines in the stolen celebrity photos story are about the web site EmmaYouAreNext.com, which displays a countdown. This was first publicized by the web site Foxweekly.com which said, “Emma Watson Nude Photos To Be Leaked By 4Chan Hacker?” FoxWeekly has no connection with NewsCorp or Fox News. The EmmaYouAreNext.com website also contained an […]

Celebrity Nudes and iCloud Phishing

The recent leak of celebrities personal photographs demonstrates just how weak our defenses are against determined attackers. From the internal evidence and the chatter on 4chan and Reddit, it does not look as if this was the result of a single attack or a single hacker. Various sources say that there was a ring of […]

Android Worms And How To Prevent Them

Recently, a malware attack in China infected around 100,000 Android devices in a few days. FireEye described the attack in their blog, and christened it XXShenqi. They call it a phishing attack, but I prefer the term worm, in that infected devices sent SMS messages to the owner’s contact list attempting to convince them to […]

Black Hat/Defcon 2014: Hacking the Internet of Things, and Things not on the Internet

Security researchers have been talking a lot lately about the Internet of Things: the refrigerator that was unfairly suspected of sending spam, the light bulbs that display your WiFi network password, and so on. There were some fine examples of this at Black Hat and Defcon this year. Jesus Molina was staying in a luxury […]

Defcon 2014: Blackphone Beefs Up Android Security

The vendor area at Black Hat goes by the name of The Business Hall, and that sums it up. It is full of security companies, large and small, pitching their products in typical trade show fashion. The vendor area at Defcon is not like that. It is a jumble of vendors selling hacker equipment, lock […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.