Spammers often use a variety of obfuscation methods in an attempt to bypass anti-spam filters. We did some follow up analysis on a recent dating spam attack in which the spammers made use of URLs i
Category: Security Response
We recently discovered an interesting Trojan horse that changes the home page of Internet Explorer and redirects traffic from certain domains to this page.
Normally this wouldn’t be out
Phishers are constantly devising strategies to develop new and distinct ideas to improve their chances of duping end users. In February 2011, phishers crafted something new. The phishing sites targ
Malicious authors have taken a variety of popular free apps from the official Android market and bundled them with malware capable of rooting the phone, harvesting data, or opening a backdoor. We h