A rise in hit-and-run spam attacks, also known as "snowshoe" spam attacks, has been detected by researchers at Symantec.
In a trend tracked by Symantec since last summer, most adult webcam spam leads Kik, an instant messaging service for all smartphones.
Most of the incidents originated overseas and the private sector was most frequently targeted.
A new academic research report provides a glimpse into the thriving and organized market for these accounts.
According to security firms Websense and Kaspersky Lab, online vandals wasted little time in capitalizing on the occasion by spreading malicious spam.
Between June and July, the U.S. Food and Drug Administration shut down 1,677 pharmacies it says were operating illegally.
Like they do with major news events and other holidays, online fraudsters are seeking to cash in on the upcoming Memorial Day weekend.
The number of fraud complaints lodged with the Internet Crime Complaint Center actually fell in 2012, but the amount of alleged losses to victims rose.
While the list of security challenges continues to grow, there are a select number of really critical issues that are center-stage for messaging leaders.
Sven Olaf Kamphuis, a man from the Netherlands with ties to Dutch web host CyberBunker, reportedly has been pegged as the suspect.
Spam campaigns are sending out spurious emails purported to be from Facebook, LinkedIn, American Airlines and financial institutions, McAfee researchers found.
Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.
After a year that witnessed a threat landscape more diverse than ever, Neil Cook, CTO at Cloudmark, talks about the unprecedented levels that spam has reached.
Software architect Troy Hunt explains how a common Facebook spam campaign functions.
Florida companies Clickbooth.com and IntegraClick were charged with knowingly allowing affiliates to deceptively market Acai Berry weight-loss products and colon cleansers.
Scammers use a click-the-pic ruse to redirect users to the Blackhole exploit kit
An "open-redirect" vulnerability has allowed scammers to phish several thousand people using shortened links to legitimate government websites.
Successful phishing attacks in 2012 include words that allude to shipping and urgency, according to a new report.
It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.
Tried-and-true phishing scams continue to win a psychological game with victims, and have hit Canada particularly hard.
You can protect your brand's online reputation, says ZeroSpam's David Poellhuber.
One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
The "Find and Call" app, which uploads a user's contact list to a remote server so its developers can spam friends and colleagues of the victim, is the first malware to enter the Apple App Store.
Criminals continue to lean on trusted brands to dupe victims out of their personal and financial information, and they are getting smarter in their strategies and techniques, said a Kaspersky Lab researcher.
Clickthroughs for a new spam campaign that appears to arrive from popular video-sharing site Vimeo takes unwitting recipients to a Canadian pharmacy site, selling sex enhancement medications.
Many of the emails sent to LinkedIn users alerting them of compromised passwords mistakenly were blocked as spam by the recipients.
Information security experts often talk about the costs of cybercrime to businesses, but a new report from Russia quantifies how much criminals make in the "cybercrime market."
Security firm Symantec's latest "Internet Security Threat Report" found that malicious attacks and malware variants are more prevalent than ever, and are being delivered to their victims in mass and targeted ways.
Traditional mafia groups are entering the cyber crime scene in Russia, which is leading to more centralization and professionalization -- and bigger profits.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure