Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

Block this file

by

When SpaMP3 hit the airwaves, some experts recommended blocking MP3 attachments, for example Sophos, and even SC Magazine. A spokesperson for GFI was quoted as saying “How many companies do you know that use MP3 files for business use?” I … Continue reading →

MP3 Spam hits the Internet (finally!)

by

Way back in March, CTO Amir Lev was quoted in a SearchSecurity article as saying that audio spam shouldn’t be too far away. We even went so far as to create some samples in our labs (no, we didn’t give … Continue reading →

How quickly can a zombie be caught?

by

Pretty @#$% quickly if you heard Amir Lev, Commtouch’s CTO speaking at the Ferris Webinar yesterday, together with Ferris’ Richi Jennings. The webinar was about understanding mail reputation services, and Amir gave an overview of different types of reputation services, … Continue reading →

Commtouch Q3 Update

by

The company announced today that 9 new OEM deals were signed in Q3, bringing the total licensing partners to 82. Which begs the obvious question: why are there still so many companies looking for innovative, content-neutral anti-spam and anti-malware solutions? … Continue reading →

Pornographic Image Spam

by

Image spam on the whole is on the decline, and stock pump-and-dump has all but disappeared. But image spam hasn’t been eliminated altogether. Lately our spam detection center has seen a significant increase in pornographic image spam (the URLs are … Continue reading →

Beware of Online Games Spam

by

A massive attack this weekend has been inundating users with emails with subjects like “Wow, Cool Games” and the like. The content of the email messages contain only “Try http://xxx.xxx.xxx.xxx, where the X’s are varying IP addresses. At one point … Continue reading →