Delivering Email Post-Data Breach

Delivering Email Post-Data Breach: 4 Tips for Avoiding the Impact

A quick Google search of “what to do after a data breach” yields specific instructions for affected consumers (determine what was stolen, change affected passwords, contact financial institutions, sign up for a ...
Security Boulevard
Netflix phish claims your membership is on hold

Netflix phish claims your membership is on hold

We take a look at a new Netflix phish in circulation, using the time-honored trick of claiming the recipient is about to lose access unless they hand over some personal information. Categories: ...

Analyzing Kelihos SPAM in CapLoader and NetworkMiner

This network forensics video tutorial covers how to analyze SPAM email traffic from the Kelihos botnet. The analyzed PCAP file comes from the Stratosphere IPS project, where Sebastian Garcia and his colleagues ...