Search Results for: blackhole
BBB Scam Returns
You may well have read about the BBB phish / exploit emails doing the rounds last week. It’s worth noting that these are still in circulation – we’ve seen five of these in the last two days linking to exploits …
4 Web Security Threats to Look Out For
Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate …
Blackhole Exploit Hones in on Amazon Users
Last week, our friends at ThreatPost posted about the ever-growing infection of websites hosting Black Hole Exploit Kits. A Black Hole exploit takes advantage of unpatched Windows operating systems. It also targets other software, such as Java and Adobe Reader, that can be …
FakeScanti Rogue Hijacks HOSTS Files
Patrick, our resident rogue AV expert from the AV Labs, have his eyes set on one particular family—FakeScanti. This rogue family first appeared in the first quarter of 2010, and it has been within the radar ever since. Enter AV …
VB: combining spam filters gives better filtering
Researchers at Virus Bulletin have written about a theoretical technique for improving spam filtering: combining the action of several filters. The researchers sent about 200,000 emails to 14 anti-spam products. No legitimate email was blocked by more than four of …
When RBLs go too far
Real Time Blackholes (RBLs) have had their share of controversy in the past, but they can be quite useful in stopping spam (if you weight their responses). However, I recently noticed a post by someone on one of Sunbelt’s discussion forums. …
More BlueSecurity
Todd Underwood looks at the BlueSecurity PR spin: The timeline from bluesecurity (BS, as it’s such a great acronym in American English) is frustratingly vague. It uses phrases like ‘tampering with the Internet backbone using a technique called “Blackhole Filtering”.’ …









