Internet Threats Trend Report April 2012

Size: px
Start display at page:

Download "Internet Threats Trend Report April 2012"

Transcription

1 Internet Threats Trend Report April 2012

2 Internet Threats Trend Report April 2012 In This Report Is 100 billion the new spam peak? Page 2 Replica spam affiliate program GlavTorg closes No visible effect on spam levels Page 3 Malware attacks focus on US tax season Accountants and customers targeted Page 5 Compromised websites an owner s perspective Page 10 Zombie hotspots Global weight shifts away from India again Page 13 Q Highlights 94 billion Average daily spam/phishing s sent Page 2 270,000 Zombies Daily turnover Page 12 Streaming media/ Downloads Most popular blog topic on user-generated content sites Page 13 Pharmacy ads Most popular spam topic (38.5% of spam) Page 3 India Country with the most zombies (19.2%) Page 13 Pornography/ Explicit Website category most likely to be contain malware Page 9

3 Overview Industry and government efforts have dealt a significant blow to spam in the past year. In the first quarter of 2012, an average of 94 billion spam s were sent per day compared to over 150 billion per day prior to the Rustock botnet takedown in March Specific social engineering campaigns of note this quarter focused on the U.S. tax season, targeting both consumers and members of the accounting profession. Facebook remains a popular outlet, with a social engineering campaign featuring an unwatchable video. Spam trends Spam levels remained low relative to the same period last year. The average decrease compared to Q was nearly 40%, with the average daily level dropping to 94 billion spam and phishing s per day. This decrease followed a marginal increase during the December 2011 holiday season. Spam averaged 75% of all s sent during the first quarter. A year has now passed since the Rustock botnet takedown that resulted in a significant drop in global spam. There is no sign of a return to pre-rustock spam levels. The sustained decrease has been attributed to many additional factors including: other botnet takedowns, increased prosecution of spammers and the source industries such as fake pharmaceuticals and replicas, and increased revenues for cybercriminals from other avenues such as banking fraud. At this point it is tempting to conclude that the decade-long growth of spam has been permanently reversed. Time will tell. Spam levels Dec 2011 to March 2012 Spam % of all s - Dec 2011 to March 2012 Page 2

4 Replica spam affiliate program GlavTorg closes Spam affiliate programs provide the link between fake pharmaceuticals and replica manufacturers and spammers. GlavTorg was one such program that focused on replica handbags and clothing. In December 2011 GlavTorg announced that it would stop payouts to affiliates at the end of January To evaluate the effect of the closure Commtouch Labs introduced the spam-subject cloud tool. The tool samples thousands of spam messages at definable intervals and plots frequently occurring terms in larger text. Spam subjects that have been sent in massive quantities become instantly Spam topics cloud for end- Jan 2012 distinguishable. The spam-subject cloud (right) for the end of January show no evidence of GlavTorg related products. In addition the spam levels for the period show no obvious influence (increase or decrease) around the dates of the announcement or the date when payments were stopped. Spammers have apparently easily realigned their activities. The spam cloud for the entire first quarter is shown below. Pharmaceuticals (Viagra, Cialis) and replicas (Rolex, Breitling) clearly lead with enhancers and software (CS5, Windows, Adobe) also featuring. Dating subjects also feature but due to the great variance of subject words, are less prominent. Spam topics cloud for Q Page 3

5 Pharmacy spam increased once again, as it did last quarter, to reach nearly 39% of all spam (around 8% more than the previous quarter). Replica-themed spam also increased in the first quarter of the year by over 5%. Spam topics in Q Spam domains As part of Commtouch s analysis of spam trends, Commtouch Labs monitors the domains that are used by spammers in the from field of the spam s. The addresses are typically faked in order to give the impression of a reputable, genuine source. Top spoofed from domains in Q This quarter, gmail.com is once again the most spoofed domain (increasing above 25% for the first time). The top 15 features popular social networking and mail sites (AOL, Yahoo, Page 4

6 Facebook, LinkedIn, MySpace) as well as DHL.com often used as part of malware attacks. Malware trends Blended attacks target accountants? Did cybercriminals target accountants? The scale of a February attack was so large that it certainly must have reached many CPAs but also many other individuals. Many of the recipients (Accountant or not) may have clicked on the links out of sheer curiosity. The attacks included subjects such as: fraudulent tax return assistance accusations. your accountant license can be revoked. your accountant cpa license termination. income tax return fraud accusations. Phony accountant tax fraud s lead to malware Clicking on the link downloaded a short HTML page that promises Page is loading, please wait. You will see tax info on this screen. In the background, the small script creates a nested iframe which brings in more JavaScript, creating further dynamic content. The process repeats until a large portion of malware code is activated. Within 2 weeks a similarly sized attack seemed to again target accounting practitioners and the small business market, this time by describing fictitious purchases of Intuit accounting software. The subjects included: Page 5

7 Your QuickBooks software order Your Intuit.com order Your Intuit.com invoice Please confirm your Intuit.com invoice The malware downloaded and deployed in the same way as described above. Phony Accounting software links lead to malware malware Levels of attached malware were generally low in the first quarter of Malware distributors generally stuck to their favorite themes such as Fedex delivery notices. Several other interesting social engineering techniques were also used during the quarter: Google have received your CV with an attached CV submission form Your friend invited you to Twitter with an attached invitation card Someone wanting to be your friend on Hi5 (a social network) Shipping updates for your Amazon.com order with attached shipping documents American Airlines ticket confirmations I love you contains only the text lovely :-) and phony assurance that F-Secure Antivirus has found no virus in the attachment Sex pictures the attached zip refers to Once extracted a typical Explorer view shows a file named document.txt. Widening the filename column Page 6

8 reveals the true.exe extension of the malware (following multiple space characters) an old trick but probably still effective. Malware levels Jan to Dec with attached malware in Q Page 7

9 Top 10 Malware The table below presents the top 10 most detected malware during the first quarter of 2012 as compiled by Commtouch s Antivirus Lab. Web security Top 10 Detected Malware Rank Malware name Rank Malware name 1 W32/InstallCore.A2.gen!Eldorado 6 W32/Sality.gen2 2 W32/RLPacked.A.gen!Eldorado 7 W32/HotBar.L.gen!Eldorado 3 W32/Sality.C.gen!Eldorado 8 W32/Vobfus.AD.gen!Eldorado 4 W32/Heuristic-210!Eldorado 9 JS/Pdfka.CI.gen 5 W32/RAHack.A.gen!Eldorado 10 W32/Korgo.V Facebook unwatchable video scam Several variants of this scam have appeared on Facebook in the last few months. January s version starts with a friend s post that looks something like this: Facebook post describes unwatchable video (with link to Blogspot page) The link takes clickers to a Blogspot page which has been very convincingly designed to look like a Facebook page with an embedded video player. (none of the Facebook elements on the top of the page are actually clickable). Visitors are informed that they need the Divx plugin/youtube Premium plugin. Blogspot page hosts fake vide player and malware download Page 8

10 Clicking on the download link runs a malicious script that performs several actions: 1) A link is posted on the user wall Facebook extracts the content for the post from the page itself which includes data specifically formatted for this purpose: <title>95% 0f All People Cant even Watch This Video F0r More Than 20 Seconds</title> <meta property= og:title content= 95% 0f All People Cant even Watch This Video F0r More Than 20 Seconds /> <meta property= og:image content= s.jpg /> <meta property= og:description content= i dare you to get past the 25 seconds.just click play /> 2) The script then installs Firefox or Chrome extensions depending on the browser used. These extensions are used to redirect users to several further scams. The redirections happen no matter what sites the user actually intended to go to. One of the redirections is to a scam offering a $50 Starbucks gift card. After coaxing the Facebook user to like and share the link they are led to an affiliate marketing site. Phony Starbuck voucher coaxes users to like and share Compromised websites store malware Many of the s carrying malware links this quarter either hosted the malware on compromised websites or used these as a platform for redirection. An example of one of the attacks is shown below. This is the screen that would be shown to anyone clicking on the links of the CPA malware attacks (see page 5). Compromised website used to host malware - message shown on screen while malware loads The malware loads in the background while this screen is shown. Meanwhile the host site continues to function normally. Page 9

11 Homepage of compromised website used to host malware During the first quarter of 2012, Commtouch analyzed which categories of Web sites were most likely to be compromised with malware. Pornographic sites climbed back up to the top spot pushing down Parked domains. As noted in previous reports, the hosting of malware may well be the intention of the owners of the parked domains and pornography sites. A new entry into the top 3 is Fashion and Beauty sites -. Website categories infected with malware Rank Category Rank Category 1 Pornography/Sexually Explicit 6 Education 2 Parked Domains 7 Health & Medicine 3 Fashion and Beauty 8 Computers & Technology 4 Portals 9 Business 5 Entertainment 10 Leisure & Recreation Compromised Websites: An Owner s Perspective Having observed the phenomenon of hacked websites for some time, Commtouch, in cooperation with StopBadware, undertook a survey of webmasters whose sites had been compromised. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage. Data from the poll reveals that malicious actors are often able to compromise legitimate websites without the site owners' knowledge: over 90% of respondents didn't notice any strange activity, despite the fact that their sites were being abused to send spam, host Page 10

12 phishing pages, or distribute malware. Nearly two-thirds of the webmasters surveyed didn't know how the compromise had happened. Other highlights from analysis of the survey's responses include: About half of site owners discovered the hack when they attempted to visit their own site and received a browser or search engine warning. 26% of site owners had not yet figured out how to resolve the problem at the time they completed the survey. 40% of survey respondents changed their opinion of their web hosting provider following a compromise. In addition to analysis and quotes from site owners, the report provides tips to help webmasters prevent their sites from being compromised. More details, including an infographic and a brief presentation summarizing the report are available at: Phishing Trends Phishing attacks target account information for many services: banks, and social network accounts, and online games. Commtouch s Security Blog has also featured phishing aimed at Google Adwords customers. In January, a similar phishing attack was directed at Microsoft adcenter users. The links in the below led to a very convincing replica of the adcenter login page. Microsoft adcenter phishing attack Page 11

13 During the first quarter of 2012, Commtouch analyzed which categories of legitimate Web sites were most likely to be hiding phishing pages (usually without the knowledge of the site owner). Portals (offering free website hosting) jumped into the highest position. Sites related to games (the previous leader), dropped off the list. Zombie trends Website categories infected with phishing Rank Category Rank Category 1 Portals 6 Sports 2 Shopping 7 Leisure & Recreation 3 Fashion & Beauty 8 Health and medicine 4 Education 9 Real Estate 5 Business 10 Personal sites The first quarter saw an average turnover of 270,000 zombies each day that were newly activated for sending spam. This number is an increase over the 209,000 of the fourth quarter of The large drop at the start of November appears to be a result of the Esthost botnet takedown. Although this botnet was primarily used for DNS changing (redirecting Web requests to malicious sites), it appears that some portion was also used to send spam. Spammers have worked to source new zombies since the start of Daily newly activated spam zombies: Oct 2011 to Mar 2012 Page 12

14 Zombie Hot Spots India again claimed the top zombie producer title, but dropped below 20% from nearly 24% in Q Brazil and the Russian Federation both climbed back up to the 2 nd and 3 rd positions. Argentina, Poland and Italy joined the top 15, displacing The United States, Romania and Ukraine. Worldwide Zombie distribution in Q Web 2.0 trends Commtouch s GlobalView Cloud tracks billions of Web browsing sessions and URL requests, and its Web Filtering service includes highly granular categorization of Web 2.0 content. In addition to filtering accuracy, this provides insight into the most popular user generated content sites. Once again, streaming media and downloads was the most popular blog or page topic staying at 22%. The streaming media & downloads category includes sites with MP3 files or music related sites such as fan pages. Most popular categories of user-generated content. Rank Category Percentage Rank Category Percentage 1 Streaming Media & Downloads 22% 8 Religion 5% 2 Computers & Technology 8% 9 Sports 4% 3 Entertainment 7% 10 Education 4% 4 Pornography/Sexually Explicit 5% 11 Leisure & Recreation 3% 5 Restaurants & Dining 5% 12 Health & Medicine 3% 6 Fashion & Beauty 5% 13 Games 3% 7 Arts 5% 14 Sex Education 2% Page 13

15 About Commtouch Commtouch (NASDAQ: CTCH) safeguards the world s leading security companies and service providers with cloud-based Internet security services. Real-time threat intelligence from Commtouch s GlobalView Cloud powers Web security, security and antivirus solutions, protecting thousands of organizations and hundreds of millions of users worldwide. References and Notes Reported global spam levels are based on Internet traffic as measured from unfiltered data streams, not including internal corporate traffic. Therefore global spam levels will differ from the quantities reaching end user inboxes, due to several possible layers of filtering. Spam levels do not include s with attached malware Visit us: and us: info@commtouch.com Call us: (US) or (International) Copyright 2012 Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch..

Internet Threats Trend Report April 2012

Internet Threats Trend Report April 2012 Internet Threats Trend Report April 2012 In This Report Is 100 billion the new spam peak? Replica spam affiliate program GlavTorg closes No visible effect on spam levels Malware attacks focus on US tax

More information

Internet Threats Trend Report October 2012

Internet Threats Trend Report October 2012 Internet Threats Trend Report October 2012 In This Report Android malware compromised email accounts target mobile OS Grum Botnet taken down spam levels unaffected Olympic Games scammers exploit once-in-four-year

More information

The State of Hacked Accounts

The State of Hacked Accounts October 2011 Overview The use of compromised (e.g. stolen credentials or hacked) accounts to send spam and scams has increased throughout 2011 to become a growing percentage of the unwanted email that

More information

In This Report. Q Highlights. 149 billion. Pharmacy ads. 258,000 Zombies. India. Streaming media/ Downloads. Parked Domains

In This Report. Q Highlights. 149 billion. Pharmacy ads. 258,000 Zombies. India. Streaming media/ Downloads. Parked Domains Internet Threats Trend Report April 2011 In This Report Spam declines after Rustock takedown along with decreased number of daily active zombies Page 2 Email-borne malware makes a comeback up to 30% of

More information

In This Report. Q Highlights. 101 billion. Pharmacy ads. 209,000 Zombies. India. Streaming media/ Downloads. Parked Domains

In This Report. Q Highlights. 101 billion. Pharmacy ads. 209,000 Zombies. India. Streaming media/ Downloads. Parked Domains Internet Threats Trend Report January 2012 In This Report Facebook in 2011 A retrospective look at security trends during the year including: Page 2 Social engineering trends Most common methods for spreading

More information

In This Report. Q Highlights. Pharmacy ads. 113 billion. 377,000 Zombies. India. Pornography/ Sexually Explicit. Streaming media/ Downloads

In This Report. Q Highlights. Pharmacy ads. 113 billion. 377,000 Zombies. India. Pornography/ Sexually Explicit. Streaming media/ Downloads Internet Threats Trend Report July 2011 In This Report Spammer tactics change Compromised accounts now favored Page 2 Analysis of compromised accounts Is all spam from Gmail and Hotmail sent by zombies?

More information

Internet Threats Trend Report Q In This Report. Q Highlights. 198 billion. Pharmacy ads. India. 339,000 Zombies

Internet Threats Trend Report Q In This Report. Q Highlights. 198 billion. Pharmacy ads. India. 339,000 Zombies Internet Threats Trend Report Q3 2010 In This Report Focused malware delivery: In this quarter there was increased usage of HTML attachments along with traditional links to malware such as the here you

More information

Spam Evolution Report: October 2009

Spam Evolution Report: October 2009 Spam Evolution Report: October 2009 Prepare by Kaspersky Lab,a leading manufacturer of secure content management solutions About Kaspersky Lab Kaspersky Lab delivers the world s most immediate protection

More information

In This Report. Q Highlights. Pharmacy ads. 183 billion. 305,000 Zombies. Brazil. Entertainment. Pornography. 838 variants

In This Report. Q Highlights. Pharmacy ads. 183 billion. 305,000 Zombies. Brazil. Entertainment. Pornography. 838 variants Internet Threats Trend Report Q1 2010 In This Report SpamAssassin Y2K10 Bug: SpamAssassin users started the quarter and the new decade with numerous false positives due to a bug in the open source software

More information

Internet Threats Trend Report April 2013

Internet Threats Trend Report April 2013 Internet Threats Trend Report April 2013 Overview The first quarter of 2013 saw a significant growth in unwanted and dangerous emails with a significant spike in levels occurring in March. The spike affected

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of September, 2007 Summarization of September Report Findings The total number of unique phishing reports submitted to APWG in September 2007 was 38,514, an

More information

DMARC Continuing to enable trust between brand owners and receivers

DMARC Continuing to enable trust between brand owners and receivers DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2

More information

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report March, 2005 Phishing Activity Trends Report March, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

November 2009 Report #35

November 2009 Report #35 November 2009 Report #35 In October 2009, spam volumes made up 87 percent of all email messages. The most notable highlight this month is the growth of spam originating from APJ (23 percent) and South

More information

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

JPCERT/CC Incident Handling Report [January 1, March 31, 2018] JPCERT-IR-2018-01 Issued: 2018-04-12 JPCERT/CC Incident Handling Report [January 1, 2018 - March 31, 2018] 1. About the Incident Handling Report JPCERT Coordination Center (herein, JPCERT/CC) receives

More information

The State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security

The State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security The State of Spam A Monthly Report June 2007 Generated by Symantec Messaging and Web Security Monthly Spam Landscape Spam activity in May 2007 was overall consistent with trends observed in previous months.

More information

Manually Create Phishing Page For Facebook 2014

Manually Create Phishing Page For Facebook 2014 Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.

More information

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

YOU CAN'T AFFORD FAKE ACCOUNTS. NOW, NEITHER CAN THE FRAUDSTERS. Fraud Report

YOU CAN'T AFFORD FAKE ACCOUNTS. NOW, NEITHER CAN THE FRAUDSTERS. Fraud Report YOU CAN'T AFFORD FAKE ACCOUNTS. NOW, NEITHER CAN THE FRAUDSTERS. Fraud Report Fake Accounts and the Black Market There s a thriving black market for fake accounts on the internet. Fake accounts are accounts

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than

More information

Q Internet Threats Trend Report

Q Internet Threats Trend Report Q1 2009 Internet Threats Trend Report Conficker Worm Infects Millions Around the World April 14, 2009 Introduction The major news of the first quarter was the rapid propagation of the Conficker worm. Research

More information

NOT PROTECTIVELY MARKED PHISHING. July 2016

NOT PROTECTIVELY MARKED PHISHING. July 2016 - PHISHING July 2016 1 Introduction: The purpose of this document is to provide an analysis of the most prevalent trends and characteristics of phishing campaigns in the UK in July 2016. The analysis is

More information

Commtouch Messaging Security for Hosting Providers

Commtouch Messaging Security for Hosting Providers Commtouch Messaging Security for Hosting Providers September 2009 nospam@commtouch.com www.commtouch.com blog.commtouch.com About Commtouch Since 1991 NASDAQ: CTCH Profitable Double digit growth Over 100

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of June, 2007 Summarization of June Report Findings In the June 2007 report the APWG introduces a brand-domain pairs measurement (page 4) which combines the

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

July 2009 Report #31

July 2009 Report #31 July 2009 Report #31 Spam volumes continue to fluctuate but averaged approximately 90 percent of all email messages in June 2009. The recent death of Michael Jackson, and the subsequent public interest

More information

4 th Quarter Phishing Activity Trends Report. Unifying the Global Response To Cybercrime. Activity October December 2017.

4 th Quarter Phishing Activity Trends Report. Unifying the Global Response To Cybercrime. Activity October December 2017. 4 th Quarter 2017 Unifying the Global Response To Cybercrime Table of Contents Statistical Highlights for 2nd Quarter 2017 3 Phishing E-mail Reports and Phishing Site Trends 4 Brand-Domain Pairs Measurement

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

Security & Phishing

Security & Phishing Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?

More information

If you re a Facebook marketer, you re likely always looking for ways to

If you re a Facebook marketer, you re likely always looking for ways to Chapter 1: Custom Apps for Fan Page Timelines In This Chapter Using apps for Facebook marketing Extending the Facebook experience Discovering iframes, Application Pages, and Canvas Pages Finding out what

More information

Advertising Network Affiliate Marketing Algorithm Analytics Auto responder autoresponder Backlinks Blog

Advertising Network Affiliate Marketing Algorithm Analytics Auto responder autoresponder Backlinks Blog Advertising Network A group of websites where one advertiser controls all or a portion of the ads for all sites. A common example is the Google Search Network, which includes AOL, Amazon,Ask.com (formerly

More information

Antivirus Myths and Facts. By Helmuth Freericks

Antivirus Myths and Facts. By Helmuth Freericks By Helmuth Freericks Introduction As an active, veteran member of the antivirus community and a pioneer of one of the earliest antivirus companies, I have spoken with thousands of people with an interest

More information

Insights JiWire Mobile Audience Insights Report Q4 2012

Insights JiWire Mobile Audience Insights Report Q4 2012 Table of Contents Mobile Audience Trends 2-6 Connected Device Adoption & Trends 7-10 Worldwide Location Highlights 11-12 Public Wi-Fi Trends 13 79.5 % of mobile consumers are influenced by the availability

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer Botnets: major players in the shadows Author Sébastien GOUTAL Chief Science Officer Table of contents Introduction... 3 Birth of a botnet... 4 Life of a botnet... 5 Death of a botnet... 8 Introduction

More information

HOLIDAY HOT SHEET N O V E M B E R 6,

HOLIDAY HOT SHEET N O V E M B E R 6, HOLIDAY HOT SHEET NOVEMBER 6, 2013 2013 Holiday hot sheet: weekly insights for the holiday marketer As marketers seek to connect with their customers during the largest consumer spending season of the

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

Bank of america report phishing

Bank of america report phishing Search Search pages & people Search Search Search pages & people Search Bank of america report phishing email We recently discovered a new phishing scam from a Bank of America spam email some reports that

More information

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report January, 2005 Phishing Activity Trends Report January, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent web sites which attempt to trick them into divulging

More information

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources

More information

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report October, 2004 Phishing Activity Trends Report October, 2004 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

CE Advanced Network Security Phishing I

CE Advanced Network Security Phishing I CE 817 - Advanced Network Security Phishing I Lecture 15 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Digital Marketing Overview of Digital Marketing Website Creation Search Engine Optimization What is Google Page Rank?

Digital Marketing Overview of Digital Marketing Website Creation Search Engine Optimization What is Google Page Rank? Digital Marketing Overview of Digital Marketing What is marketing and digital marketing? Understanding Marketing and Digital Marketing Process? Website Creation Understanding about Internet, websites,

More information

GLOBAL VIDEO INDEX Q4 2013

GLOBAL VIDEO INDEX Q4 2013 GLOBAL VIDEO INDEX TABLE OF CONTENTS Introduction...3 Executive Summary...4 Mobile + Tablet Video...5 Long-form Video...7 Live Video...8 Sports Video...9 Online Video Outlook...11 Turning Information into

More information

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY RSA CYOTA PROJECT PROPOSAL RSA FRAUDACTION ANTI-PHISHING SERVICE V.1 2011 Overview This brief highlights the benefits

More information

August 2009 Report #32

August 2009 Report #32 August 2009 Report #32 While overall spam volumes averaged 89 percent of all email messages in July 2009, spam volumes continue to fluctuate. During July 2009, image spam continued to have an impact reaching

More information

Website Operators Manual

Website Operators Manual Talking Points Website Operators Manual About the Session About the Site Open to Questions Mission of useventing.com Represent our Roots Intuitive Answer User Questions Be an Authority on Eventing Represent

More information

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong How Enterprise Tackles Phishing Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong Hackers turning to easy marks - Social engineering Phishing was the #1 threat vector (> 50%) for Office

More information

Get Twitter Followers in an Easy Way Step by Step Guide

Get Twitter Followers in an Easy Way Step by Step Guide Get Twitter Followers in an Easy Way Step by Step Guide See how I made $2300 in 3 Days using Twitter Traffic All in one guide for getting traffic via Twitter 1 Get Twitter Followers in an easy way Step

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

Phishing. Eugene Davis UAH Information Security Club April 11, 2013

Phishing. Eugene Davis UAH Information Security Club April 11, 2013 Phishing Eugene Davis UAH Information Security Club April 11, 2013 Overview A social engineering attack in which the attacker impersonates a trusted entity Attacker attempts to retrieve privileged information

More information

Marketing & Back Office Management

Marketing & Back Office Management Marketing & Back Office Management Menu Management Add, Edit, Delete Menu Gallery Management Add, Edit, Delete Images Banner Management Update the banner image/background image in web ordering Online Data

More information

Social Networking Applied

Social Networking Applied Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday

More information

SEO 101 YOUR GUIDE TO GETTING STARTED

SEO 101 YOUR GUIDE TO GETTING STARTED SEO 101 YOUR GUIDE TO GETTING STARTED What is Search? 2 The simple definition is that Search is what happens when people look for your specific website or search for services/products your company provides.

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore 6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore Consumers are adopting mobile devices of all types at a blistering pace. The demand for information on the go is higher

More information

The Path to a Successful Website

The Path to a Successful Website CREATIVE DESIGN STUDIO Website Checklist: The Path to a Successful Website Get Traffic to Your Website Organic search Keyword optimization Target only one keyword per page Use keywords in: URL Meta title

More information

facebook a guide to social networking for massage therapists

facebook a guide to social networking for massage therapists facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook

More information

Download firefox with virus protection

Download firefox with virus protection P ford residence southampton, ny Download firefox with virus protection 3-11-2015 Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for

More information

Why it Really Matters to RESNET Members

Why it Really Matters to RESNET Members Welcome to SEO 101 Why it Really Matters to RESNET Members Presented by Fourth Dimension at the 2013 RESNET Conference 1. 2. 3. Why you need SEO How search engines work How people use search engines

More information

McAfee Labs Threat Report

McAfee Labs Threat Report McAfee Labs Threat Report December 217 THREATS STATISTICS Malware Incidents Web and Network Threats 1 McAfee Labs Threat Report, December 217 The McAfee Labs count of new malware in Q3 reached an all-time

More information

The State of Spam A Monthly Report August Generated by Symantec Messaging and Web Security

The State of Spam A Monthly Report August Generated by Symantec Messaging and Web Security The State of Spam A Monthly Report August 2007 Generated by Symantec Messaging and Web Security Monthly Spam Landscape While overall spam activity remained steady in July 2007, the tactics being used are

More information

Be certain. MessageLabs Intelligence: May 2006

Be certain. MessageLabs Intelligence: May 2006 Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep

More information

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent  s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA 2014 INTERNET COMMERCE CASE STUDY The Battle Against Phishing and Fraudulent Emails 100 S. Ellsworth Ave 4th Floor San Mateo, CA 94401 650.627.7667 ABOUT AGARI Agari analizes big data from the world s

More information

Unique Phishing Attacks (2008 vs in thousands)

Unique Phishing Attacks (2008 vs in thousands) The process of attempting to acquire sensitive information, such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In the 2 nd half

More information

Copyright 2018 Trend Micro Incorporated. All rights reserved.

Copyright 2018 Trend Micro Incorporated. All rights reserved. Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

NinthDecimal Mobile Audience Q Insights Report

NinthDecimal Mobile Audience Q Insights Report Q2 2012 Insights Report Table of Contents Connected Device Trends 2 Location-Based Behaviors 3-4 52% of on-the-go moms own a tablet 52 % Social Sharing Behaviors 5-7 Connected Device Adoption 8-9 Worldwide

More information

Spam Protection Guide

Spam  Protection Guide Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34 Youtube.com/ViralJadhav

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34  Youtube.com/ViralJadhav ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining.in +91 9558821174 Who Can Join? Business Owners who want to attract more

More information

Holiday Season Cyberattacks on Pace to Increase by Nearly 60%

Holiday Season Cyberattacks on Pace to Increase by Nearly 60% Holiday Season Cyberattacks on Pace to Increase by Nearly 60% NOVEMBER 2018 1 Tis the season for cyberattacks. According to the Carbon Black Threat Analysis Unit (TAU), organizations should expect to see

More information

SEO Search Engine Optimization. ~ Certificate ~ For: WD QREN

SEO Search Engine Optimization. ~ Certificate ~ For:  WD QREN SEO Search Engine Optimization ~ Certificate ~ For: www.outsourcedhr.com WD02040214 QREN1050214 By www.websitedesign.co.za and www.search-engine-optimization.co.za Certificate added to domain on the: 4

More information

ADVANCE DIGITAL MARKETING & SEO COURSE. Page 1 of 34 Youtube.com/ViralJadhav

ADVANCE DIGITAL MARKETING & SEO COURSE. Page 1 of 34   Youtube.com/ViralJadhav ADVANCE DIGITAL MARKETING & SEO COURSE Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining.in +91 9558821174 Who Can Join? Business Owners who want to attract more customers

More information

Prolexic Attack Report Q4 2011

Prolexic Attack Report Q4 2011 Prolexic Attack Report Q4 2011 Prolexic believes the nature of DDoS attacks are changing: they are becoming more concentrated and damaging. Packet-per-second volume is increasing dramatically, while attack

More information

A guide to GOOGLE+LOCAL. for business. Published by. hypercube.co.nz

A guide to GOOGLE+LOCAL. for business. Published by. hypercube.co.nz A guide to GOOGLE+LOCAL for business Published by hypercube.co.nz An introduction You have probably noticed that since June 2012, changes have been taking place with the local search results appearing

More information

Korea Phishing Activity Trends Report

Korea Phishing Activity Trends Report Korea Phishing Activity Trends Report June, 2006 Issued by KrCERT/CC, Korea Internet Security Center Korea Phishing Activity Trends Report analyzes phishing attacks reported to KrCERT/CC via the organization

More information

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34 Youtube.com/ViralJadhav

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34  Youtube.com/ViralJadhav ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE Page 1 of 34 www.magnetmarketing.in Youtube.com/ViralJadhav contact@viraljadhav.com +91 9558821174 Who Can Join? Business Owners who want to attract more

More information

TOP 7 UPDATES IN LOCAL SEARCH FOR JANUARY 2015 YAHOO DIRECTORY NOW OFFICALLY CLOSED GOOGLE INTRODUCES NEWADWORDS TOOL AD CUSTOMIZERS

TOP 7 UPDATES IN LOCAL SEARCH FOR JANUARY 2015 YAHOO DIRECTORY NOW OFFICALLY CLOSED GOOGLE INTRODUCES NEWADWORDS TOOL AD CUSTOMIZERS Changes In Google And Bing Local Results Penguin Update Continues To Affect Local Rankings How To Add A sticky Post on Google+ page TOP 7 UPDATES IN LOCAL SEARCH FOR JANUARY 2015 0 Facebook Allows Calls-To-Action

More information

REPORT. proofpoint.com

REPORT. proofpoint.com REPORT proofpoint.com Email fraud, also known as business email compromise (BEC), is one of today s greatest cyber threats. These socially engineered attacks seek to exploit people rather than technology.

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

Comodo SiteInspector Software Version 3.3

Comodo SiteInspector Software Version 3.3 Comodo SiteInspector Software Version 3.3 Administrator Guide Guide Version 3.3.032812 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo SiteInspector...

More information

Measurement and Tracking Awareness June 2011

Measurement and Tracking Awareness June 2011 Measurement and Tracking Awareness June 2011 1 2010-2011 Cooperative Awareness Program Goals and Measurement The below goals were based on a initial budget of $547,572, actual media spend was $418,483.

More information

Google Analytics. powerful simplicity, practical insight

Google Analytics. powerful simplicity, practical insight Google Analytics powerful simplicity, practical insight 1 Overview Google Analytics Improve your site and increase marketing ROI Free, hosted web analytics service View over 80+ reports online, for download,

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale WHITE PAPER Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale One key number that is generally

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions A DIGITAL LIFE E-GUIDE A Guide to 2013 New Year s Resolutions 2012 is coming to a close, and what better way to prepare for the year ahead than to get our New Year s resolutions straightened out? With

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Part 1: How Can I Make Next Year s Event More Successful? November 15, 2010 Presenters: Amy Braiterman, Blackbaud Kim Romaszewski, Blackbaud

Part 1: How Can I Make Next Year s Event More Successful? November 15, 2010 Presenters: Amy Braiterman, Blackbaud Kim Romaszewski, Blackbaud Part 1: How Can I Make Next Year s Event More Successful? November 15, 2010 Presenters: Amy Braiterman, Blackbaud Kim Romaszewski, Blackbaud Events Boot Camp Series Events Boot Camp, Part 1: How Can I

More information

Phishing in the Age of SaaS

Phishing in the Age of SaaS Phishing in the Age of SaaS AN ESSENTIAL GUIDE FOR BUSINESSES AND USERS The Cloud Security Platform Q3 2017 intro Phishing attacks have become the primary hacking method used against organizations. In

More information

Facebook Page Insights

Facebook Page Insights Facebook Product Guide for Facebook Page owners Businesses will be better in a connected world. That s why we connect 845M people and their friends to the things they care about, using social technologies

More information

Insights JiWire Mobile Audience Insights Report Q2 2012

Insights JiWire Mobile Audience Insights Report Q2 2012 JiWire Mobile Audience Report JiWire Mobile Audience Report Table of Contents Connected Device Trends 2 Location-Based Behaviors 3-4 Social Sharing Behaviors 5-7 Connected Device Adoption 8-9 Worldwide

More information

Gary Viray Founder, Search Opt Media Inc. Search.Rank.Convert.

Gary Viray Founder, Search Opt Media Inc. Search.Rank.Convert. SEARCH + SOCIAL Gary Viray Founder, Search Opt Media Inc. Goo gol Google Algorithm Change Google Toolbar December 2000 Birth of Toolbar Pagerank They move the toilet mid stream. 404P Pages are ranking

More information