Sven Olaf Kamphuis, a man from the Netherlands with ties to Dutch web host CyberBunker, reportedly has been pegged as the suspect.
Spam campaigns are sending out spurious emails purported to be from Facebook, LinkedIn, American Airlines and financial institutions, McAfee researchers found.
Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.
This may not be the first time Virut has been used to spread the Waledac worm, whose goal is to earn money for its purveyors through rogue ad networks, online pharmacies, or outright fraud.
After a year that witnessed a threat landscape more diverse than ever, Neil Cook, CTO at Cloudmark, talks about the unprecedented levels that spam has reached.
November 21, 2012
Software architect Troy Hunt explains how a common Facebook spam campaign functions.
Florida companies Clickbooth.com and IntegraClick were charged with knowingly allowing affiliates to deceptively market Acai Berry weight-loss products and colon cleansers.
Scammers use a click-the-pic ruse to redirect users to the Blackhole exploit kit
An "open-redirect" vulnerability has allowed scammers to phish several thousand people using shortened links to legitimate government websites.
Successful phishing attacks in 2012 include words that allude to shipping and urgency, according to a new report.
It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.
Tried-and-true phishing scams continue to win a psychological game with victims, and have hit Canada particularly hard.
Dropbox has brought in outside security experts to investigate what could be a possible email address leak after users complained of unwanted mail flooding their inboxes.
One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.
While Dutch law enforcement managed to shut down two C&C servers, the Grum botnet is still active. And if its controllers are so inclined, they can continue to deliver spam.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
The "Find and Call" app, which uploads a user's contact list to a remote server so its developers can spam friends and colleagues of the victim, is the first malware to enter the Apple App Store.
Criminals continue to lean on trusted brands to dupe victims out of their personal and financial information, and they are getting smarter in their strategies and techniques, said a Kaspersky Lab researcher.
Clickthroughs for a new spam campaign that appears to arrive from popular video-sharing site Vimeo takes unwitting recipients to a Canadian pharmacy site, selling sex enhancement medications.
Many of the emails sent to LinkedIn users alerting them of compromised passwords mistakenly were blocked as spam by the recipients.
May 09, 2012
Information security experts often talk about the costs of cybercrime to businesses, but a new report from Russia quantifies how much criminals make in the "cybercrime market."
Security firm Symantec's latest "Internet Security Threat Report" found that malicious attacks and malware variants are more prevalent than ever, and are being delivered to their victims in mass and targeted ways.
Traditional mafia groups are entering the cyber crime scene in Russia, which is leading to more centralization and professionalization -- and bigger profits.
Twitter on Thursday filed a lawsuit against five entities that allegedly provide tools so spammers can tweet unwanted links to legitimate users.
A collaborative effort of security organizations announced Wednesday that they knocked offline an embodiment of the Kelihos botnet, which was believed dead, but since emerged with new capabilities.
While progress against security threats has been made, attackers are targeting new vulnerabilities, such as those found in mobile devices, according to the annual IBM X-Force study.
And so it begins. The all-the-rage virtual pinboard Pinterest is the latest social networking darling to draw the fancy of cyber swindlers.
February 26, 2012
Yes, advanced persistent threats are stealthy and difficult to stop, but organizations should remember that the most common attack type facing them is mass malware.
A Russian computer programmer has denied allegations by Microsoft that he was responsible for manning a prolific spam botnet.
Facebook and the state of Washington have filed separate lawsuits against Adscend Media, alleging the company was responsible for spreading malware and for stealing personal information from Facebook users.