CYREN Security Blog

 

Articles

Categories

Domain Validation (DV) SSL Certificate used for PayPal Phishing

by Þröstur Thorarensen

Filed under Email Security, Phishing, Web Security.

As users become more aware of phishing and data theft, they become more cautious. Unfortunately as users become more cautious, attackers must become more devious. In a recent discovery, we found a phishing website  that had been issued a valid SSL Certificate. SSL Certificates are small data files that activate the HTTPS protocol and allows secure connections between a web browser and a web server. Most users don’t realize that there are actually different levels of security when it comes to SSL certificates.

Q2 Cyber Threats Report: The Enterprise Under Attack

by Lior Kohavi

Filed under Security Research & Analysis, Web Security.

While high-profile data breaches may have declined in frequency during the quarter, they most
definitely rose in impact. The fallout from the US Government Office of Personnel Management
(OPM) data breaches continues to be felt, the latest example of which being that GSA has placed
contracts for post-breach protection for the 22 million people affected. The impact of these
breaches can be expected to last a long time; some experts suggest that the remediation process
for the OPM breaches could take anywhere up to 40 years to complete.

Is Monday the Worst Security Day of the Week?

by Chris Taylor

Filed under Anti-Malware, Miscellaneous, Phishing, Web Security.

In a recent conversation with the person owning information security at an enterprise account – let’s call him “Steve”, I heard an interesting story.  In general, he feels that they handle security pretty well, but he detailed one challenge that I felt was worth sharing.

Phishing for the big phish in United Kingdom’s plentiful waters

by Ólöf Kristjánsdóttir

Filed under Email Security, Phishing, Web Security.

In 2014, the phishing URLs tracked by CYREN increased dramatically, rising 233% from the previous year. Why did this number increase? One reason is the potential for monetary gain. Cyber criminals use phishing attacks to steal personally sensitive and identifiable information from users. Sometimes this is to gain access to your online bank and transfer money directly to their own accounts. Often though, they will sell the Personally Identifiable Information (PII) on the black market where it will accrue almost ten times more value than credit card information.

New Tricks of Macro Malware

by Lordian Mosuela

Filed under Anti-Malware, Malware Analysis, Security Research & Analysis.

In the past few months, we have noticed a rise in spam emails that have an attachment of ".DOC" extension filename but actually is a ".MHT" file. This trending trick  seems to be a new way to spread macro malware. A file with ".MHT" extension is a Web page archive format which saves images, text and objects from the original word document into a single file. You can convert a ".DOC" or a Word Document file into a ".MHT" or a single file Web page using Microsoft Word 2007.