threat-intelligence-insights

Phish-Pharming: Using social engineering to hijack domains at the source

Recently, there have been several high-profile incidents involving a novel combination of ...
threat-intelligence-insights

Deadline approaching for comments on the new ICANN gTLD proposed Application Guidebook

There are only a few days left to make a difference regarding the future of online corporate ...
threat-intelligence-insights

Nearly Seventy Percent of All Malware is Delivered via Drive-By Downloads

There has been no shortage of press regarding malware on the Internet over the past several months. ...
threat-intelligence-insights

Scads hurt everyone.

What is a “scad”? Scads are deceptive sponsored search results that usually appear at the top ...
threat-intelligence-insights

Domain Registration Scam picks up in volume

Cyveillance has recently observed an increase in the volume of spam email related to a domain ...
threat-intelligence-insights

How Protected Are We Really Against Malware?

Fueled by scalability and ease of use, it is not surprising that malware attacks delivered via the ...
threat-intelligence-insights

Google Policy Changes Impacts UK Brand Holders

Beginning May 5, 2008, Google will no longer protect brand holders against competitors bidding on ...
threat-intelligence-insights

Realistic Solution to the Malware Epidemic?

It's hardly newsworthy that security experts at the RSA Conference this week pointed to malware as ...
threat-intelligence-insights

Cross Site Scripting Meets Search Engine Optimization

Yesterday's revelation that certain Google search results contain tainted URLs that simultaneously ...
threat-intelligence-insights

The Growing Imperative for Cyber Intelligence

Today’s front page article in USA Today points out the growing importance that intelligence ...