Cloudmark is the most trusted leader in security — protecting traffic, data and infrastructure. We safeguard service providers, enterprises and consumers worldwide with immediate, predictive protection from ever-evolving network threats.
What’s lurking in your DNS environment?
As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.
It's been a hot year for DNS. In our 2014 Annual Security Report we take a look at various forms of DNS abuse including DNS amplification, tunneling, exfiltration, and a study of DNS resource exhaustion at a major ISP. In the email space, bootleg Viagra® spam is a staple. This year, Cloudmark commissioned a chemical analysis of various samples from these fake pharmacies to determine just how legitimate and possibly dangerous these pervasive ads might be. Mobile customers have had their own woes this year with the largest targeting of Apple iMessage by spammers seen to date and we completed similar investigative research into this campaign. Our report details an investigation into the origins and on-going legal battle against these spammers and their evolving campaigns.
Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.
This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.
While it appears like Lenovo has had another slap to the face, this time it isn’t their fault (well, sort of). Yesterday, its website, Lenovo.com, was maliciously redirected to a defaced site controlled by the well-known hacker group, Lizard Squad. Prior to this, Google’s Vietnamese site suffered a similar attack where users were redirected away […]
This week we learned of the Superfish Adware preinstalled on Lenovo computers, which used a tool from Komodia.com to disable the security in SSL communications. It turns out that the use of Komodia’s package was more widespread than just Superfish, and there may be millions of computers out there vulnerable to attack by fake HTTPS […]
CCA’s Global Expo brings together more carriers than any other trade show event and is the best venue for meeting and networking with the decision makers of carrier companies. With a lively exhibit hall, numerous networking opportunities, and dynamic educational sessions, CCA’s Global Expo provides the ideal meeting place for stakeholders in the mobile industry to come together under one roof.
RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.
"Andrew Conway, a research analyst at security firm Cloudmark, told CBS News he has already begun seeing a flurry of phishing emails disguised as requests from the IRS."
"Hackers claiming to hail from the notorious Lizard Squad group have been gloating online after appearing to take down Xbox Live again with a DDoS attack."
"A huge spam campaign has been installing the Dyreza banking Trojan on tens of thousands of UK computers, specifically targeting those with accounts at major banks."
The world’s top communications service providers turn to Cloudmark to protect their networks.
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.—Veenod Kurup