This Halloween, we’ve rounded up ten of the scariest tactics cybercriminals use to trick users into clicking on malicious links, open suspicious attachments, install fake software, and more.
Twitter is a very popular online social platform because it's lightweight, easy to use, and widely adopted. Unfortunately these reasons also make it a prime target for abuse. See how this is done, and how to avoid being a victim.
As news about the Ebola pandemic flooded the Internet, cybercriminals and have seized the opportunity to use the popularity of the topic as bait to lure unsuspecting victims to pages that could be used to steal their information and credentials.
A case of spammers looking for legitimate ways to send spam. Our research shows an IP provider in Canada and several US-registered domains were found to be sending salad words spam.
Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
The growth in spam volume during the first of half of 2014 can be attributed to the prevalence of threats that use spam as an infection vector. This include known threats like DOWNAD, UPATRE, and ZEUS/ZBOT.