CYREN Security Blog

 

Articles

Categories

Dual Detection Engines—Using Layered Security to Battle Cybercrime

by Avi Turiel

Filed under Anti-Malware, Antispam, Phishing.

As vendors and service providers step-up their efforts to block spam, detect malware, and prevent access to malicious websites for their customers, CYREN engineers and analysts have been asking themselves the question “can more than one embedded engine reduce the risk of cyberattacks?” While a good single engine can provide up to 98% threat detection, the fact of the matter is, no engine is ever going to provide 100% security. We began to wonder how close to 100% security can you get and what it would take to get there.

How Did a Hacker Get Photos of So Many Celebrities in Their Birthday Suits?

by Avi Turiel

Filed under Email Security, Phishing, Web Security.

This week’s big hacking news that the personal iCloud accounts of at least 100 celebrities were compromised and personally “revealing” images stolen off them, seems to have kept the news outlets buzzing for a while.

Phony Robin Williams Phone Video Posts on Facebook

by Avi Turiel

Filed under Security Research & Analysis, Web Security.

There are times when you find the efforts of cybercriminals both amusing and annoying, and then there are times when your contempt for these villainous creeps really gets to you. 

The recent and tragic death of actor and comedian Robin Williams shocked the world. Most people strongly feel that the man should be allowed to rest in peace and his family allowed to grieve privately. Yet, a basic respect for life and death seems to be lacking in the mind of the vast majority of cybercriminals. 

What You See Isn’t Necessarily What You Get

by Lordian Mosuela

Filed under Anti-Malware, Email Security, Web Security.

Fake Document Icons—How to Recognize Them

Over the past few months, CYREN analysts have observed a rise in malware distributed via fake document icons. While nothing new (in fact, this is an old malware distribution trick), unsuspecting victims regularly still get taken in by this form of cybercrime which primarily targets the Adobe Acrobat PDF and Microsoft Word and Excel files. Fortunately, with very little effort, there are some fairly easy ways for individuals to learn to identify fake files by double-checking the file extension.

419 scam uses Ebola virus tragedy

by Avi Turiel

Filed under Antispam, Email Security.

Cybercriminals will stoop to any level it seems, even using the tragedy of the Ebola virus in West Africa to steal money.
In the latest “419” rendition, scammers distribute an email claiming the recipient is the beneficiary of a large amount of money left in a bank account by a client who became a victim of Ebola. To add credibility to the email, the sender suggests the recipient “go to google and find out more on the Outbreak of EBOLA VIRUS in West Africa.”