Protecting Business Networks From Drive By Spam Attacks

”Drive by” spam attacks are a growing business network security risk, affecting those who open emails containing a malicious script that downloads malware to the user’s PC that ultimately infects the company’s network. These emails don’t always include an attachment. Some HTML-based varieties are reported to be activated with the mere opening of an email and nothing more.

Details

Google Wallet Security: Rooted Device Vulnerabilities…

Much has been said in the last few days about the security of the Android platform in general and Google Wallet specifically. One frequent question that has been asked of the Google Wallet PIN vulnerability we found is “should the average consumer be concerned about mobile device exploits that require root privileges?” The unfortunate answer is “yes.” The reason is that while it is true that this PIN vulnerability requires root privileges to succeed, it does not require that the device be rooted previously.

Details

zvelo Newly Enhanced Phishing Website, Attack Detection System

With the increasing complexity of threats appearing on the Internet, coupled with the rapid development of security products designed to mitigate them, the number of phishing-based attacks have grown. In the first half of 2011 and compared to the second half of 2010, the Anti-Phishing Working Group (APWG) reported a 62% increase in unique phishing attacks worldwide in 200 top-level domains (TLDs).1 This trend warrants swift action to address the growing threat.

 

Details