Threat Spotlight: Spam Served With a Side of Dridex
5 min read
This post was authored by Nick Biasini with contributions from Kevin Brooks Overview The use of macro enabled word documents has exploded over the last year, a primary example payload being Dridex. Last week, Talos researchers identified another short lived spam campaign that was delivering a new variant of Dridex. This particular campaign lasted less than […]
Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More …
2 min read
If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam systems from sinking the spam. This yielded a 250 percent increase in spam […]
Big Data in Security – Part V: Anti-Phishing in the Cloud
8 min read
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing […]
Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop
6 min read
Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it trying to solve? Dazhuo: From a high-level view, Auto […]
The Highs and Lows of the Pump and Dump Scam
3 min read
The Internet remains an environment where it is important to keep your wits. The recent indictment of nine individuals on stock fraud charges reminds us that the pump and dump scam continues to be perpetrated [1][2]. Stock spam emails were particularly prevalent during the mid-2000’s, with these messages reportedly comprising 15% of all spam in […]
Expiring Albert: Recycling User IDs and the Impact on Privacy
4 min read
Within many organisations offering online services to the public, there must be a great temptation to expire redundant user accounts that occupy desirable user IDs but which are never used by their users. Presumably the user IDs have been registered by someone, used on a couple of occasions, and then forgotten about. Expiring and recycling […]
Why I love working trade shows like Microsoft TechEd for Cisco
1 min read
I have lost count of the number of trade shows I’ve worked over my career. But working trade shows for Cisco over the past 14 months has been a uniquely positive experience. Microsoft TechEd North America 2013 makes my 5th show evangelizing Cisco UCS and our solutions. I have been able to have long (sometimes […]
Have You Registered for K-12 & Public Safety May 22nd?
1 min read
Improving School Safety with Your WLAN See how your campus Wi-Fi can improve emergency response Register Now | ...
Register for the K-12 Education: Using Wireless Technologies in Public Safety Webcast
1 min read
Innovate the education environment by deploying Cisco BYOD Solutions for K-12 to facilitate teaching innovation and emergency safety . Small, medium, and large school districts across the country...