Phishing & Malicious Spam Trends from Q1 2014

Posted by Malcovery Security

Tue, Apr 15, '14

Cybercriminals had a busy first quarter, increasing speed and efficiency in their activities. This allowed them to kick off the new year with fresh tactics for delivering malicious spam to unsuspecting internet users around the world. 

Read More

Heartbleed Phishing Scams: Protect Your Brand From Phishing Criminals

Posted by Malcovery Security

Fri, Apr 11, '14

If we were to pick one word to summarize this week in tech, it would be Heartbleed. “The ultimate web nightmare,” says Mashable, the Heartbleed vulnerability is unlike anything that we have seen in recent history.

Read More

Topics: Phishing

Why Do We Treat Cybercrime Differently than Real-Life Crime?

Posted by Gary Warner

Tue, Apr 8, '14


What would you do if you were the victim of a crime? For example, what if you walk out to your car after work and find the window smashed and the stereo stolen? Wouldn’t you call the police?

Imagine that, this weekend, you’re leaving a bar with some friends. A man walks up, points a gun at you and demands your wallet. You’d call the police, right?

Now pretend you receive an email saying that the bank needs you to reset your password. You go to the provided website in the email and the next time you check your balance there’s $500 missing. Who would you call?

Read More

GameOver Zeus: Three Things You Should Know

Posted by Brendan Griffin

Wed, Apr 2, '14

The Zeus banking trojan is a popular topic in the security world these days. It’s not new, but it still garners attention as one of the most successful and prolific trojans in use today.

Banking trojans hide on infected machines and intercept activity related to the user’s finances—bank account logins, investment information, even purchases on sites like eBay. This differs from phishing in that the user infected with a banking trojan like Zeus is not visiting a fake website. Instead, he or she is interacting with the real banking, investing, or retail websites completing legitimate transactions. However, the victim is being watched. Password entry, sites visited, screenshots of what the victim is viewing—these can all be being monitored. Ultimately, as the user is conducting his or her business online the malware is stealing private information and sharing it with criminals.

Read More

Topics: Malware

Cybercrime Lessons from HBO's True Detective

Posted by Mike Perez

Mon, Mar 31, '14


For those who did not follow HBO’s recent hit drama, True Detective, starring Woody Harrelson (as detective Marty" Hart) and Matthew McConaughey (as detective “Rust" Cohle), it was an intense drama about a seventeen-year struggle to break a serial murder case and bring a sadistic criminal to justice. For those who do know all about True Detective, that is not a surprise.

Read More

Cybercrime: What Happens When Nothing Happens?

Posted by Mike Perez

Wed, Mar 26, '14

Unfortunately, Sometimes A Lot!

For years, too many to be sure, we have lived in a world of “techno-faith,” believing that various Anti Virus products, firew

alls, black lists, white lists, whatever color lists you can think of, are hard at work protecting us from the dark side of cyber – the cyber criminals.

While it is certainly true that all the things mentioned above are working hard to protect us, and all those companies have the very best intentions and protective feelings for us – and not just because we pay them, it also is true that we are not being well protected, not really.

Read More

Who’s to Blame for the Target Breach?

Posted by Greg Coticchia

Fri, Mar 14, '14

Why are we still discussing the Target breach in March 2014? In a world where ‘news’ literally lasts minutes---OK maybe hours or in special cases days---here we are still discussing breach that started back in the time frame of November 27-December 15, 2013.

Well let’s start by putting this breach—its importance ---in context. At the RSA Conference, TripWire did a survey that unveiled that the Target breach has a larger impact than Snowden leaks on cybersecurity budgets and executive awareness. That, in and of itself, underscores its significance. In short, it had an impact on business in terms of spending and executives realizing that, yes, it is more than the monetary costs that are actually in the income statement---there are remediation costs, and more importantly, reputational costs. And those costs do indeed dwarf the monetary costs. I speak with security professional every day who dismiss the reputational costs to an organization. Well, ask Target about how that is going. 

Read More

Topics: retail

Why Retail Security Breaches Keep Happening

Posted by Malcovery Security

Sun, Mar 9, '14

Read More

Topics: Cybersecurity

WhatsApp Spam: a malware distribution scam

Posted by Gary Warner

Mon, Feb 24, '14

On February 19, 2014, Facebook Announced the purchase of WhatsApp for $4 billion in cash and 183,865,778 shares of Facebook stock ($12 Billion in current value) plus an additional $3 billion in shares to the founders that will vest over four years, for a total purchase price of $19 Billion. Within 24 hours, spammers were using WhatsApp lures to attract traffic to counterfeit pharmaceutical websites! Journalists in the United States were scurrying trying to figure out what WhatsApp even is, let alone why it should be worth $19 Billion.

Read More

Facebook Acquires WhatsApp: Why Corporate Security Professionals Should Pay Attention

Posted by Malcovery Security

Thu, Feb 20, '14

Yesterday, Facebook announced the largest acquisition in its 10-year history and the second largest internet deal of all time - the purchase WhatsApp for $19 billion.

Read More

Topics: Corporate Security

Subscribe to Email Updates