The Latest in IT Security

Posts Tagged ‘brand names’

Social networking websites have actively been used in different malicious campaigns by cybercriminals in the past –  most of which incorporate techniques such as phishing and spam.  One of these campaigns are the Blackhole Exploit Kit (BHEK) spam campaign, which has been plaguing Internet users for quite a while. BHEK spam campaigns are known to […]

Read more ...

Yesterday, we wrote about the return of Amazon spam, and how criminals behind this campaign led users to have their software exploited via the Blackhole exploit kit, especially if they’re not properly patched. At the end of that entry, we included a list of campaigns that use popular brand names that criminals bank on to […]

Read more ...

We are quite used to see well known brand names being used in phishing spam campaigns that lead to spam websites, usually online pharmacies. We’ve seen eBay, Amazon, Yahoo, Google, Microsoft, Facebook, Twitter, LinkedIn and so on. It is to us still a question why do the spammers try so hard to create phishing messages […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments