Cyren Security Blog

Delve into the world of cybersecurity and cybercrime as Cyren experts explore the latest threats targeting businesses, as well as industry trends and technological advances, and how these pressures, risks, and changes impact business reputation and growth.

Subscribe to this Blog

An anti-spam standard?


From Security_Watchdog blog: “The Internet Engineering Task Force has granted preliminary approval to DomainKeys Identified Mail (DKIM). The platform promises to kill spam by preventing spoofing. DomainKeys attaches an encrypted digital signature unique to the sender to each email when … Continue reading →

Microsoft sues stock spamming John Doe


Hoping to tackle the growing problem of pump-and-dump stock scams Microsoft has quietly filed lawsuits against at least three alleged perpetrators who it says used its MSN Hotmail networks to promote stocks. Pump-and-dump spam has not only taken up resources … Continue reading →

Americans are less bothered by spam


The Pew Internet and American Life Project recently published the results of a survey about how American’s relate to spam. The overall conclusion is that “The volume of spam is growing in Americans’ personal and workplace email accounts, but email … Continue reading →

Marketing Malware


We always knew that security can’t be left up to users, and now there is hard proof. Reuters just published the results of an (admittedly ridiculous) test in which a computer specialist named Didier Stevens offered free viruses on Google … Continue reading →

Symantec false positives cripple thousands of Chinese PCs


Virus signature update mistakes critical Windows files for malware. “It’s a terrible day for lots of Chinese users (especially Enterprise Users) who use Norton products today,” CISRT said. “This issue has made a huge effection to Chinese people.” Other reports … Continue reading →

Embedded image spam losing its luster?


We reported last month in the Commtouch Q1 2007 Spam Trends Report that a new kind of spam had appeared that links to a hosted image rather that embedding it in the message itself. In the samples reported on spammers … Continue reading →