You are viewing 'spam'

Corporate and Government Domains Included in Ashley Madison Data Breach

Users not following security policies, putting themselves and their employers at risk

Joseph (JB) Blankenship

August 21, 2015 - Posted by Joseph (JB) Blankenship to Security Insight

Business Man

This week, hackers calling themselves Impact Team released two data dumps that are allegedly from the recent breach of cheating website Ashley Madison and its parent company Avid Life Media (ALM). The first data dump contained approximately 10 Gb of data, mostly user information dating back to 2008. This data includes names, street addresses, e-mail addresses and transaction amounts for the 32 million Ashley Madison users. The data also includes financial details, physical descriptions as well as users’ sexual preferences and fantasies.

Many government and corporate domains are included in the data. This means that many users used their work e-mail address to access this site. Most organizations have clear security policies in place that prohibit the use of work e-mails and equipment to access any websites that are not work related. A... read more >

My Life According to Spam

If the spam I received actually portrayed my daily life

Jon-Louis Heimerl

April 21, 2015 - Posted by Jon-Louis Heimerl to Security Insight

Jon's spam

I find that I have to tolerate my junk email. I feel like I get so much of it. I have not checked statistics lately, but for me, probably something on the order of 90% of the email I get is spam. I can’t help but wonder, though, what someone would think if they had no concept of “spam?” If they thought that the email I receive actually portrayed an accurate picture of me…

According to my spam

I make $6000 a month working at home as an autopilot, and using an action packed 12 page guide, I have discovered just how affordable real estate can be. At least when I am not busy on one of my many woodworking projects. I credit my creative money making philosophy and my early retirement to brain smart supplements and clinically proven creative thinking from the Utah Coalition for... read more >

One Phish, Two Phish, Read Phish, Spear Phish

No Room at the Inn for these Phishing Attempts

Bernie Lambrecht

December 18, 2014 - Posted by Bernie Lambrecht to Security Insight

Holiday Scams Ahead

Ahh...the holidays are upon us once again.

Time to drag out your moose-shaped eggnog mugs, that really do exist and ugly Christmas sweaters. Or if you prefer, your little pink bunny outfit that Aunt Clara made for you. Whatever you’re most comfortable in while roasting chestnuts on an open fire.

As many are aware, the holidays are a crazy, busy time of year. Just because you have to help coordinate four different Christmas celebrations in three different time zones during two weeks, it doesn’t mean you can let your guard down when it comes to phishing and spear phishing attempts. If anything, you need to be more vigilant, especially as people clutter their... read more >

Protecting Yourself From Spear Phishing

Security Tactics for the Holidays and Beyond

Derek Weakley

December 04, 2014 - Posted by Derek Weakley to Security Insight


This holiday season is here, and scammers and spear phishermen are on the hunt. Fake package delivery emails, order confirmations and similar tactics are on their way, if they’re not already in play.

Using the holiday shopping advice from Santa Kraus and a hefty helping of awareness and tact, we can make it through this holiday season unscathed.

Spear phishing, a more targeted form of phishing, narrows the target audience from a large scale (anyone with a valid e-mail address) to individuals or a smaller group of confirmed or likely targets. The goal with both phishing and spear phishing is generally some form of criminal gain. Motives range from financial exploitation to character defamation and even just a bit of fun.

Information used to exploit comes from a wide variety of sources including... read more >

A Bad Day Phishing is Better than a Good Day at Work

Jon-Louis Heimerl

October 28, 2014 - Posted by Jon-Louis Heimerl to Security Insight


It seems like phishing emails never let up. Or maybe that they are increasing again. Or maybe it’s just that I feel like I am getting more of them. Maybe it’s all in my mind.

Phishing emails come in essentially two flavors:

  1. Scare tactics
  2. Awesome deals

In either case, the goal of the phisher (is that a word?) is to make you react instead of think. The more you stop and think about that email, the less likely you are to just react to it instead of thinking to yourself “phishing=delete.”

As a matter of fact, in the world of phishing, you would never really think about your email, you would just read it, and think “I have to do this!” (whatever “this” is).

That’s why we saw so many phishing emails advertising Jennifer Lawrence et al in the buff.

Read.... read more >

1 | 2 | 3 | 4 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)