Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

In the last year, hackers have stolen more than 500 million financial records without ever entering a building -- and nearly 80% of businesses don’t even realize they’ve been hacked. Why? Because targeted attacks that pinpoint specific individuals ...
Blog Entry by piero_depaoli | 29 Oct 2014 | 0 comments
Symantec has recently seen a spam campaign involving fake wire transfer request emails. While this technique is not new, and has had some coverage in the press this year, we have seen an increase in this type of spam recently. The purpose ...
Blog Entry by Sean Butler | 28 Oct 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
Celebrity lures continue in the world of phishing. We have seen several phishing sites in the past that used altered celebrity images to get users’ attention. Today, we have a couple of examples in which phishers continued their celebrity  promotion ...
Blog Entry by Avdhoot Patil | 26 Aug 2014 | 0 comments
Phishers are known for capitalizing on current events and using them in their phishing campaigns. Celebrity scandals are popular and Symantec recently observed a phishing attack on the Facebook platform that claimed to have the sex tape of well-known ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
Contributor: Virendra Phadtare Phishers are continuing to focus on social networks as a platform for their phishing activities. Fake social media applications in phishing sites are not uncommon. In the past, we have seen a bogus Asian chat app ...
Blog Entry by Avdhoot Patil | 01 Aug 2014 | 0 comments
Contributor: Mayur Deshpande Phishing emails masquerading as banking communications are observed in huge quantities every single day. Spammers will often exploit global news and major world events to carry out phishing attacks. Phishing emails ...
Blog Entry by Binny Kuriakose | 23 Jul 2014 | 0 comments
Contributor: Vijay Thawre It’s a time of freedom and joy for Americans as the United States prepares to celebrate its 238th Independence Day on July 4 with fireworks, parades, music, and public events. However, like every other year, spammers are ...
Blog Entry by Binny Kuriakose | 04 Jul 2014 | 0 comments
Image spam has been around for a longtime and peaked in January 2007 when Symantec estimated that image spam accounted for nearly 52 percent of all spam. Pump-and-dump image stock spam made up a significant portion of that 52 percent. Image spam has been ...
Blog Entry by Sammy Chu | 26 Jun 2014 | 0 comments
On June 19, we came across an interesting e-card spam campaign. E-card spam typically distributes malware; however this campaign simply redirects the user to a “get rich quick” website. This campaign’s emails are very basic. The messages are sent ...
Blog Entry by Sean Butler | 23 Jun 2014 | 0 comments