threat-intelligence-insights

Do browser features from Microsoft, Google, Mozilla, and Apple provide adequate protection against phishing attacks?

To better understand the daily risks consumers face from phishing attacks, Cyveillance test sampled ...
threat-intelligence-insights

Phish-Pharming: Using social engineering to hijack domains at the source

Recently, there have been several high-profile incidents involving a novel combination of ...
threat-intelligence-insights

Deadline approaching for comments on the new ICANN gTLD proposed Application Guidebook

There are only a few days left to make a difference regarding the future of online corporate ...
threat-intelligence-insights

Nearly Seventy Percent of All Malware is Delivered via Drive-By Downloads

There has been no shortage of press regarding malware on the Internet over the past several months. ...
threat-intelligence-insights

Scads hurt everyone.

What is a “scad”? Scads are deceptive sponsored search results that usually appear at the top ...
threat-intelligence-insights

Domain Registration Scam picks up in volume

Cyveillance has recently observed an increase in the volume of spam email related to a domain ...
threat-intelligence-insights

How Protected Are We Really Against Malware?

Fueled by scalability and ease of use, it is not surprising that malware attacks delivered via the ...
threat-intelligence-insights

Google Policy Changes Impacts UK Brand Holders

Beginning May 5, 2008, Google will no longer protect brand holders against competitors bidding on ...
threat-intelligence-insights

Realistic Solution to the Malware Epidemic?

It's hardly newsworthy that security experts at the RSA Conference this week pointed to malware as ...
threat-intelligence-insights

Cross Site Scripting Meets Search Engine Optimization

Yesterday's revelation that certain Google search results contain tainted URLs that simultaneously ...