Asia's Source for Enterprise Network Knowledge

Friday, May 24th, 2019

SPAM

Ingenious imitation, fake GDPR notices, phishing found in 120 million malicious emails targeting business

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Cybercriminals tried to use more tricks to reach businesses in 2018; with 120 million attempted attacks through malicious emails.

The start of 2017 witnessed a 5,000-fold decrease in the world's largest spam botnet mailings

The start of 2017 witnessed a 5,000-fold decrease in the world's largest spam botnet mailings

Amid a sharp drop in the number of malicious mass mailings, spam actors are learning new ways to bypass spam filters to succeed in their attacks.

8 biggest email pet peeves

8 biggest email pet peeves

Spam, emoticons and group emails -- most people have a love-hate relationship with email. Here are workers' eight biggest email pet peeves.

New domain zones becoming an arena for large-scale online scams

News

The new range of top level domains, launched in January 2015 and intended for use by relevant communities and organisations, has proved irresistible to spammers.

Elaborate spam operation uses nearly 750,000 fake Twitter accounts

News

Fake accounts were part of an elaborate scheme to peddle a type of diet pill known as Green Coffee Bean Extract.

Two out of five emails sent from Singapore this year were spam

Singapore is 49th in the world for volume of email spam sent this year, based on research compiled from Cloudmark’s Global Threat Network. The United States topped the rankings, followed by Brazil and France.

Report sees social media worm resurgence as spam rises dramatically

There have been a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam, finds the McAfee Threats Report: First Quarter 2013.

McAfee Labs also saw continued increases in the number and complexity of targeted threats, including information-gathering Trojans and threats targeting systems’ master boot records (MBRs). 

Post-PC threat era has arrived, confirm Trend Micro reports

Cybercriminals have moved beyond the PC, targeting Android, social media and even the Mac OS X with new attacks, finds Trend Micro’s 2012 Annual Roundup and Mobile Security reports.

Post-PC threat era has arrived, confirm Trend Micro reports

Cybercriminals have moved beyond the PC, targeting Android, social media and even the Mac OS X with new attacks, finds Trend Micro’s 2012 Annual Roundup and Mobile Security reports.

Thermic manufacturer standardizes on Fortinet for security

Ariston Thermo Group, a company involved in in thermic comfort manufacturing, has deployed Fortinet’s FortiGate network security appliances to protect a network of 2,000 employees across 70 locations around the world. The manufacturer has also implemented Fortinet’s FortiMail secure messaging solution to protect 3,500 mailboxes from spam and other malware targeting emails.