logo

Software Updates Used as Phishing Bait

Phishers have been targeting software updates to distribute malicious software (malware). In the example below, the phisher sent the email from a spoofed Microsoft account...

Read More >

logo

Cyveillance Identifies Dangerous “Maltweets” on Twitter

Cyber criminals are leveraging high profile current events and Twitter to distribute malicious links on the Internet. Cyveillance recently discovered “Maltweets,” Twitter messages or tweets...

Read More >

logo

The Ever-Growing Threat from Cyber Criminals

A story by the San Francisco Chronicle posted on www.sfgate.com earlier today sheds light on the “cat-and-mouse game” played every day on the Internet between...

Read More >

logo

ICANN’s Registry-Registrar Cross Ownership Proposal is a Bad Idea

The public interest in supporting competition and protecting end-users does not support elimination of the current separation of Registry and Registrar ownership. The end result...

Read More >

logo

Cyveillance sees phishing attacks against ISPs on the rise

During the past couple of weeks Cyveillance has noticed an increase in the amount of phishing activity targeting Internet Service Providers (ISPs). While credentials stolen...

Read More >

logo

Cyveillance’s Approach to Cyber Security Validated by Recent Obama Administration Initiative

For years now Cyveillance has been the cyber intelligence leader, emphasizing a proactive approach to cyber security. Our method of gathering, processing and delivering cyber...

Read More >

logo

Cyveillance is very pleased to be part of QinetiQ North America portfolio

Cyveillance is extremely excited to become the latest addition to QinetiQ North America http://www.cyveillance.com/web/news/press_rel/2009/2009-05-06.asp. Cyveillance’s record growth, quality service, outstanding technology and single focus on...

Read More >

logo

Another Contrary Perspective – Recent Reports of “Over-Phishing” Are Flawed

In their recent paper “A Profitless Endeavor – Phishing as Tragedy of the Commons” Cormac Herley and Dinei Florencio hypothesize that the Phishing industry is...

Read More >

logo

Do browser features from Microsoft, Google, Mozilla, and Apple provide adequate protection against phishing attacks?

To better understand the daily risks consumers face from phishing attacks, Cyveillance test sampled unique and confirmed phishing attacks uncovered against a variety of organizations....

Read More >

logo

Phish-Pharming: Using social engineering to hijack domains at the source

Recently, there have been several high-profile incidents involving a novel combination of techniques to hijack the legitimate domains of banks and other financial institutions. This...

Read More >

top