spam

spam - News, Features, and Slideshows

Features

  • PDF files most trusted...and most targeted

    PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.

  • China remains spam haven due to 'bulletproof' hosting

    An overwhelming majority of Web sites promoted through spam are hosted in China at service providers that many times choose to ignore complaints and allow illegal activity, according to research from the University of Alabama.

  • Spammers cashing in on Twitter, Iran, new iPhone

    Spammers are never far from a hot story, it seems, and in the past day they've been flooding Twitter with phoney messages about Iran and the<strong> </strong>latest iPhone 3.0 operating system.

  • 9 Dirty Tricks: Social Engineers' Favourite Pick-Up Lines

    What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks (See: Social Engineering: Eight Common Tactics). Here we look at some of the most common lines these people are using to fool their victims..

  • Spam is silenced, but where are the feds?

    On October 14, the US Federal Trade Commission, with help from the US Federal Bureau of Investigation and New Zealand police, announced that it had shut down a vast international spam network known as HerbalKing.

  • Will the real spam king please stand up?

    As more and more spammers are arrested, prosecuted, and sued under state and federal antispam statutes, there's one thing you can count on: Someone somewhere will invariably call the targeted spammer a "spam king."