email

IcoScript rat controlled via email services, including Yahoo and Gmail

Experts at the German security firm G-Data discovered a RAT dubbed IcoScript which receives commands from C&C via email services…

10 years ago

Gmail hacking, a mine of data for phishing and spam attacks

An Israeli researcher disclosed a Gmail vulnerability, fixed by Google, that exposes an indefinite number of Gmail addresses and business…

10 years ago

Using lnk file to deceive users in phishing attacks

Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting  .lnk files.…

10 years ago

Be aware, Apple iOS Data protection doesn’t protect email attachments

Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple's data protection mechanisms. Mobile…

10 years ago

More than 360 million stolen credentials available on the black market

Hold Security firm discovered more than 360 million newly stolen credentials and around 1.25 billion email addresses available for sale…

10 years ago

The business behind a hacked email account

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account?…

11 years ago

FireEye on alarming evolution of advanced threats in H2 2012

FireEye is one of most interesting security companies, thanks to its investigations many cases have been discovered in the last…

11 years ago

My read of WebSense 2013 Threat Report

WebSense has just released 2013 Threat Report, an interesting analysis of cyber threats based on data collected by the Websense…

11 years ago

New Drive-By Spam Infects unsuspecting users

The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until…

12 years ago

This website uses cookies.