Through this multi-part blog, we offer a different perspective, though at the same time we intend preserving the essence of methodology utilized by Stuxnet or similar worms/viruses to propagate and infect. Read more
The holiday season is not always ‘the most wonderful time of year’ when it comes to e-threats – there’s more online activity with many new shoppers and that can bring out the worst in the cybercriminal community. The recent launch of our eScan... Read more
Till recent times, email harvesting was a time consuming process and was never real-time. This constituted, making connections to the smtp server and providing a dictionary to carry out the attack. With the advent of social networking, many site... Read more
Before we jump on to the topic of phishing attacks, let us understand the two important aspects that govern the success or failure of these types of attacks. 1. Sender Policy Framework (SPF) records 2. Deployment of SPF check What is an SPF Reco... Read more
Analysis of MailScan Logs Period 28th May 2010 11:44AM to 28th May 2010 16:35 PM (5 hours of Logs) Recently, when one of India’s top MNCs, which used a leading Anti-Spam Solution, faced a problem with its outgoing e-mail server’s IP getting fre... Read more