Video Screencast Help

Search

Search results

Celebrity lures continue in the world of phishing. We have seen several phishing sites in the past that used altered celebrity images to get users’ attention. Today, we have a couple of examples in which phishers continued their celebrity  promotion ...
Blog Entry by Avdhoot Patil | 26 Aug 2014 | 0 comments
Phishers are known for capitalizing on current events and using them in their phishing campaigns. Celebrity scandals are popular and Symantec recently observed a phishing attack on the Facebook platform that claimed to have the sex tape of well-known ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Some customer faced with memory allocation error problem on SMG-SP 10.5(32bit) and provided tcmalloc solution. But they always wants to add plenty information into SMG-SP implementation guide. 1.How to implement tcmalloc library 2.How to ...
Idea by TSEKI | 07 Aug 2014 | 0 comments
Contributor: Virendra Phadtare Phishers are continuing to focus on social networks as a platform for their phishing activities. Fake social media applications in phishing sites are not uncommon. In the past, we have seen a bogus Asian chat app ...
Blog Entry by Avdhoot Patil | 01 Aug 2014 | 0 comments
Contributor: Mayur Deshpande Phishing emails masquerading as banking communications are observed in huge quantities every single day. Spammers will often exploit global news and major world events to carry out phishing attacks. Phishing emails ...
Blog Entry by Binny Kuriakose | 23 Jul 2014 | 0 comments
Contributor: Vijay Thawre It’s a time of freedom and joy for Americans as the United States prepares to celebrate its 238th Independence Day on July 4 with fireworks, parades, music, and public events. However, like every other year, spammers are ...
Blog Entry by Binny Kuriakose | 04 Jul 2014 | 0 comments
Image spam has been around for a longtime and peaked in January 2007 when Symantec estimated that image spam accounted for nearly 52 percent of all spam. Pump-and-dump image stock spam made up a significant portion of that 52 percent. Image spam has been ...
Blog Entry by Sammy Chu | 26 Jun 2014 | 0 comments
On June 19, we came across an interesting e-card spam campaign. E-card spam typically distributes malware; however this campaign simply redirects the user to a “get rich quick” website. This campaign’s emails are very basic. The messages are sent ...
Blog Entry by Sean Butler | 23 Jun 2014 | 0 comments
The Symantec Global Intelligence network has detected a significant increase in hit-and-run spam attacks (sometimes referred to as ‘snowshoe’ spam attacks) from .club domains in the last 24 hours. Earlier this year the Internet Corporation for Assigned ...
Blog Entry by Sammy Chu | 12 Jun 2014 | 0 comments
May 13, 2014 witnessed the release of another posthumous compilation album of Michael Jackson recordings, named Xscape. This reworked collection of Jackson tracks was highly anticipated by music lovers, ever since its announcement in March, 2014. News of ...
Blog Entry by Binny Kuriakose | 16 May 2014 | 0 comments