threat-intelligence-insights

Digital Copiers an Opportunity for Data Thieves

Among the many services we offer our clients, Cyveillance monitors the internet for important ...
threat-intelligence-insights

Are AV Reviews Providing a False Sense of Security?

PC World recently reviewed Norton Internet Security 2010 praising the tool as “one of the top ...
threat-intelligence-insights

Docstoc’s DocCash Provides Incentive for Copyright Abuse and Spam

Docstoc is an online document sharing service that allows users to upload files like Microsoft ...
threat-intelligence-insights

Typosquatting and Brand Owners; Comments from Ben Edelman

In mid-February Harvard researchers Tyler Moore and Benjamin Edelman posted their research on the ...
phishing

Blippy, a Spear Phisher’s Dream

This month, a service called Blippy was rolled out to the general public. In a CNN article this ...
phishing

Report Phishing Attacks

If you think you have received a phishing email, please send it to:   ...
threat-intelligence-insights

Cyber Safety 101 Courses January 19

Here at Cyveillance we spend a lot of time educating our customers about threats to their business ...
threat-intelligence-insights

The U.S. Secret Service Electronic Crimes Task Forces

There has never been greater focus on the threat posed by attacks on our nation's infrastructure. ...
threat-intelligence-insights

Hosting Companies Targeted in Recent Phishing Attacks

Earlier today, Cyveillance detected attacks targeting Web hosting companies and their customers. As ...
threat-intelligence-insights

Google Search Results Poisoning Extends to Online Pharmacies

Tactic Used to Spread Malware Now Observed Hijacking Users, Pushing Them to Illegal Online ...