Cyber Threat

'Spam King' pleads guilty to sending more than 27M Facebook messages

'Spam King' pleads guilty to sending more than 27M Facebook messages

By

A Las Vegas man pleaded guilty to sending more than 27 million Facebook messages in a massive spam campaign.

U.K. ham radio operators spammed with malware

By

U.K. ham radio operators are the target of a phishing scam asking them to open a malware-infected attachment purportedly from Ofcom Spectrum Licensing.

NYMag.com hit with DDoS attack from man who hates NYC

By

NYMag.com was hit with a DDoS attack that lasted about 12 hours and was executed by a man with a vendetta against all things having to do with New York City.

Eliminating the Blind Spot - Rapidly detecting and responding to the advanced and evasive threat

With today's threat actors continuing to evolve their tradecraft by employing more advanced and evasive techniques, it's all about mitigating risk and the potential reach of any intrusion.

Android vulnerability allows attackers to 'spoof' URL titles

By

An Android stock browser vulnerability was discovered that could allow cyber criminals to "spoof" the address bars and potentially carry out phishing schemes.

Protecting Cyber Networks Act introduced by House committee

By

A new 'threat sharing' cybersecurity bill was introduced by leaders of the U.S. House of Representatives Intelligence Committee.

Exploits, mobile and cloud storage threats will plague users in 2015

Exploits, mobile and cloud storage threats will plague users in 2015

2015 is setup to be one of the most dangerous years for not only your PC but also your mobile devices and cloud storage.

The Internet of Things (IoT) will fail if security has no context

The Internet of Things (IoT) will fail if security has no context

The Internet of Things requires a new way of thinking and acting, one that will protect a business and help it grow.

Watering hole attacks: Detect end-user compromise before the damage is done

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks.

The good, bad and ugly

The good, bad and ugly

While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.

IE exploits are the "Threat of the Month"

IE exploits are the "Threat of the Month"

The "Threat of the Month" in our November issue are IE exploits.

Living in a world of trust

Living in a world of trust

You can protect your brand's online reputation, says ZeroSpam's David Poellhuber.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US