spam fitler Click to Share on Facebook

Email Security and Spam News

To keep you updated with the latest news in the email security and anti spam instustry we now provide access to the latest stories.

SentinelOne makes YouTube delete Bsides vid 'cuz it didn't like the way bugs were reported

8/18/2018

Research silenced amid copyright, trademark claims

If you were at BSides Manchester in England this week, you hopefully caught James Williams' presentation on the shortcomings of some commercial antivirus tools.…

Full Story

'Oh sh..' – the moment an infosec bod realized he was tracking a cop car's movements by its leaky cellular gateway

8/18/2018

Internet boxes blab coordinates on login pages

Black Hat If you want to avoid the cops, or watch deliveries and call-outs by trucks and another vehicles in real-time, well, there's potentially not a lot stopping you.…

Full Story

Web cache poisoning just got real: How to fling evil code at victims

8/17/2018

Cache me outside, how 'bout dah?

BSides Manchester Websites can be hijacked to turn their caches into exploit delivery systems.…

Full Story

Shiver me timbers: Symantec spots activist investor Starboard side

8/17/2018

Time for cyber-security firm to pull up the baggywrinkle?

Security slinger Symantec is facing a bruising battle with activist investor Starboard Value, which has nominated five directors to the security firm's board after having amassed a 5.8 per cent shareholding.…

Full Story

Most staffers expect bosses to snoop on them, say unions

8/17/2018

You’re not paranoid if they’re really out to get you

The TUC, a federation of trade unions in England and Wales, is lobbying to gain a legal right to be consulted on surveillance in the workplace, as it opened up on staffers’ growing concerns about their bosses snooping on them.…

Full Story

What happens to your online accounts when you die?

8/17/2018

The digital entropy of death

BSides Manchester What happens to the numerous user logins you've accumulated after you die or become too infirm to manipulate a keyboard?…

Full Story

Who was it that hacked Apple? Ozzie Ozzie Ozzie, boy boy boy!

8/17/2018

Protip: don't label your folder of warez as "hacky hack hack"

An overzealous Apple fanboy from Australia plead guilty to criminal charges after he allegedly cracked the Cupertino giant's systems in hopes of landing a job.…

Full Story

Juno this ain't right! Chinese hackers target Alaska

8/16/2018

Tsinghua University blamed for espionage attack

An attack on US government facilities in Alaska has been traced back to China's Tsinghua University and a larger hacking effort.…

Full Story

Mozilla-endorsed security plug-in accused of tracking users

8/16/2018

Web Security says there's nothing nefarious to its URL collection

A security plug-in for the Firefox browser is under fire after users discovered it was collecting and uploading their online activity.…

Full Story

Making money mining Coinhive? Yeah, you and nine other people

8/16/2018

10 users controlling the bulk of cryptocoin generator funds

Mining internet currency on websites with Coinhive scripts is a lucrative endeavor, but only for a handful of people.…

Full Story

India's Cosmos bank raided for $13m by hackers

8/15/2018

Report points finger at North Korea for cyber-heist

Cosmos Bank in India says that hackers made off with $13.4m in stolen funds over the weekend.…

Full Story

Support for ageing key exchange crypto leaves VPNs open to attack

8/15/2018

Ancient issue causing new ones

Security gaps have been identified in widely used implementations of the IPsec protocol, which is used in the set up of Virtual Private Networks (VPNs).…

Full Story

Bitcoin backer sues AT&T for $240m over stolen cryptocurrency

8/15/2018

Michael Terpin not happy about funds-draining SIM swap fraud

A bitcoin investor is suing AT&T for $240m after it allegedly ported his phone number to a hacker, allowing the criminal to steal $24m in cryptocurrency.…

Full Story

Baddies of the internet: It's all about dodgy mobile apps, they're so hot right now

8/15/2018

Report lift veil on online fraudsters' current habits

Rogue mobile apps have become the most common fraud attack vector, according to the latest quarterly edition of RSA Security's global fraud report.…

Full Story

Foreshadow and Intel SGX software attestation: 'The whole trust model collapses'

8/15/2018

El Reg talks to Dr Yuval Yarom about Intel's memory leaking catastrophe

Interview In the wake of yet another collection of Intel bugs, The Register had the chance to speak to Foreshadow co-discoverer and University of Adelaide and Data61 researcher Dr Yuval Yarom about its impact.…

Full Story

Criminals a bit less interested in nicking Brits' identities this year

8/15/2018

ID fraud drops to four-year low

New figures reveal UK identity fraud dropped during the first six months of 2018 to reach a four-year low.…

Full Story

Florida Man laundered money for Reveton ransomware. Then Microsoft hired him

8/15/2018

Former network engineer gets 18 months in the clink

A former Microsoft network engineer will be spending a sojourn behind bars after pleading guilty to conspiracy to commit money laundering.…

Full Story

Patch Tuesday heats up with pair of exploited zero-days squashed – plus 58 other vulns fixed

8/15/2018

Summertiiiiiime, and the hacking is easy

Microsoft and Adobe have teamed up to deliver more than 70 patches with this month's Patch Tuesday batch released today.…

Full Story

Hackers manage – just – to turn Amazon Echoes into snooping devices

8/14/2018

But it requires custom hardware, firmware and access to your Wi-Fi

DEF CON Hackers have managed to hack Amazon's Echo digital assistant and effectively turn it into a listening device, albeit through a complex and hard-to-reproduce approach.…

Full Story

Oracle: Run, don't walk, to patch this critical Database takeover bug

8/14/2018

Flaw in House Larry's flagship product allows 'complete compromise' of servers

Oracle is advising customers to update their database software following the discovery and disclosure of a critical remote code execution vulnerability.…

Full Story

Three more data-leaking security holes found in Intel chips as designers swap security for speed

8/14/2018

Apps, kernels, virtual machines, SGX, SMM at risk from attack

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory.…

Full Story

CVE? Nope. NVD? Nope. Serious must-patch type flaws skipping mainstream vuln lists – report

8/14/2018

Infosec firm fingers 'decentralised' reporting

The first half of 2018 saw a record haul of reported software vulnerabilities yet a high proportion of these won’t appear in any mainstream flaw-tracking lists, researcher Risk Based Security (RBS) has claimed.…

Full Story

May the May update be with you: OpenSSL key sniffed from radio signal

8/14/2018

'One and Done' attack patched in library's May 2018 release

If you missed the OpenSSL update released in May, go back and get it: a Georgia Tech team recovered a 2048-bit RSA key from OpenSSL using smartphone processor radio emissions, in a single pass.…

Full Story

Faxploit: Retro hacking of fax machines can spread malware

8/14/2018

20th Century tech causing problems in the 21st

Video Corporations are open to hacking via a booby-trapped image data sent by fax, a hacker demo at DEF CON suggests.…

Full Story

Cisco patches IOS in response to boffins' IKE-busting breakthrough

8/14/2018

Switchzilla issues update for authentication bypass flaw

Cisco has pushed out an update for its internetwork operating system (IOS) and IOS XE firmware in advance of a Usenix presentation on circumventing cryptographic key protocol.…

Full Story

Intel finally emits Puma 1Gbps modem fixes – just as new ping-of-death bug emerges

8/14/2018

Broadband-throttling bug finally gets a write-up and CVE

More than 18 months after the design blunder was first brought to light, Intel is still working to iron out the creases in its Puma high-speed broadband modem chipsets.…

Full Story

It's official: TLS 1.3 approved as standard while spies weep

8/13/2018

Now all you lot have to actually implement it

An overhaul of a critical internet security protocol has been completed, with TLS 1.3 becoming an official standard late last week.…

Full Story

US voting systems: Full of holes, loaded with pop music, and 'hacked' by an 11-year-old

8/13/2018

Pen and paper is still king in America election security

DEF CON Hackers of all ages have been investigating America’s voting machine tech, and the results weren't great.…

Full Story

Criminal justice software code could send you to jail and there’s nothing you can do about it

8/13/2018

Trade secrets are trumping personal liberty

DEF CON American police and the judiciary are increasingly relying on software to catch, prosecute and sentence criminal suspects, but the code is untested, unavailable to suspects' defense teams, and in some cases provably biased.…

Full Story

Prank 'Give me a raise!' email nearly lands sysadmin with dismissal

8/13/2018

Staffer learns hard way: boss jokes don't mix well with infosec demos

Who, Me? Welcome again to Who, Me?, where we invite Reg readers to begin the week crossing their fingers it will be better than those of our featured techies.…

Full Story

Former NSA top hacker names the filthy four of nation-state hacking

8/13/2018

Carefully omits to mention the Land of the Free

DEF CON Rob Joyce, the former head of the NSA’s Tailored Access Operations hacking team, has spilled the beans on which nations are getting up to mischief online.…

Full Story

UK cyber cops: Infosec pros could help us divert teens from 'dark side'

8/13/2018

Police seek mentor-like techies to help talented kids

UK police are looking to cybersecurity firms to help implement a strategy of steering youngsters away from a life in online crime.…

Full Story

Snap code snatched, Pentagon bans bands, pacemakers cracked, etc

8/11/2018

New zero-day vendor opens up shop, and more in infosec this week

Roundup This week, the infosec world descended on Las Vegas for BlackHat and DEF CON to share stories of bug hunting, malware neural nets, hefty payout offers, and more.…

Full Story

The off-brand 'military-grade' x86 processors, in the library, with the root-granting 'backdoor'

8/10/2018

Dive into a weird and wonderful 'feature' of Via's embedded hardware chips

Black Hat A forgotten family of x86-compatible processors still used in specialist hardware, and touted for "military-grade security features," has a backdoor that malware and rogue users can exploit to completely hijack systems.…

Full Story

Hi-de-Hack! Redcoats red-faced as Butlin's holiday camp admits data breach hit 34,000

8/10/2018

Staff opened phishing email

Updated Holiday camp and British institution Butlin's has admitted 34,000 visitor records have been compromised.…

Full Story

Congresscritters want answers on Tillerson's rm -rf /opt/gov/infosec

8/10/2018

Reps probe Rex's wrecking ball job on crucial Cyber Issues office

US House Democrats are asking Republicans to subpoena the State Department over its decision to shut down a key government cybersecurity office.…

Full Story

Google Spectre whizz kicked out of Caesars, blocked from DEF CON over hack 'attack' tweet

8/10/2018

'Chaos specialist' Linton's e-quip backfires

Updated At midnight on Thursday, Matt Linton, a senior Google bod who was one of the key players in sorting out the Spectre CPU security hole mess, went to his hotel room in Caesars Palace, Las Vegas – and found his key no longer worked.…

Full Story

Hackers can cook you alive using 'microwave oven' sat-comms – claim

8/10/2018

Planes, ships, military equipment at risk due to backdoors, vulns

Black Hat Four years ago, IOActive security researcher Ruben Santamarta came to Black Hat USA to warn about insecurities in aircraft satellite-communication (SATCOM) systems. Now he’s back with more doom and gloom.…

Full Story

Encryption doesn't stop him or her or you... from working out what Thing 1 is up to

8/10/2018

Why we hardly have to sniff the packet to know you play tennis with an IoT racket

You don't need to sniff clear-text Internet of Things traffic to comprehensively compromise a gadget-fan's home privacy: mere traffic profiles will do the job nicely, a group of researchers has found.…

Full Story

Spec-exec CPU bugs sweep hacking Oscars – and John McAfee’s in there like a bullet

8/10/2018

Fun and frolics at the 2018 Pwnie Awards

Black Hat The whizz kids who uncovered the Spectre and Meltdown data-leaking flaws in modern processors have scooped two Pwnie Awards – often referred to as the information security industry’s Oscars.…

Full Story

Can we talk about the little backdoors in data center servers, please?

8/10/2018

Remote management a double-edged sword, IT admins warned at hacking conference

Black Hat Data centers are vital in this cloudy world – yet little-understood management chips potentially give hackers easy access to their servers in ways sysadmins may not have imagined.…

Full Story

Say what you will about self-driving cars – the security is looking 'OK'

8/10/2018

Miller, Valasek discuss today and tomorrow's robo-ride defenses

Black Hat Car hacking wizards Charlie Miller and Chris Valasek have turned their attention to autonomous vehicles – and reckon the security is surprisingly good.…

Full Story

You can't always trust those mobile payment gadgets as far as you can throw them – bugs found by infosec duo

8/10/2018

Tech needs to mature a little more, perhaps

Black Hat Those gadgets and apps used by small shops and traders to turn their smartphones and tablets into handheld sales terminals? Quite possibly insecure, you'll no doubt be shocked to discover.…

Full Story

Kaspersky VPN blabbed domain names of visited websites – and gave me a $0 reward, says chap

8/10/2018

DNS leak flaws are outside of bug-bounty scope

Updated Kaspersky's Android VPN app whispered the names of websites its 1,000,000-plus users visited along with their public IP addresses to the world's DNS servers.…

Full Story

Crims hacked accounts, got phones, resold them – and the Feds reckon they've nabbed 'em

8/9/2018

Thousands of mobes allegedly slurped, fenced via phishing, etc

A dozen people have been indicted in America for allegedly fencing more than $1m in smartphones and other kit obtained via hacking and fraud.…

Full Story

Oh, fore putt's sake: Golf org PGA bunkered up by ransomware attack just days before tournament

8/9/2018

That's rough, bet they were well teed off – crooks want Bitcoin

The Professional Golfers' Association of America (PGA) was hit by ransomware just before one of the sport's biggest pro events, which teed off on Thursday.…

Full Story

Discover which dangers lurk ahead – at Sophos' 'See the Future' event

8/9/2018

Invitation to lunch, workshops and talks

Promo Cybersecurity software firm Sophos is inviting IT professionals to "See the Future" at The Brewery, near the Barbican in London, on Tuesday 9 October.…

Full Story

How evil JavaScript helps attackers tag possible victims – and gives away their intent

8/9/2018

Countdown to ancient IE a telltale sign of malice

A honeypot project operated by Japanese comms company NTT has turned up a bunch of new approaches to malware obfuscation.…

Full Story

WhatsApp security snafu allows sneaky 'message manipulation'

8/9/2018

You could put words in people's mouths, claim researchers

Researchers claim to have uncovered weaknesses in WhatsApp that can be exploited to manipulate messages in private and group conversations.…

Full Story

Should I infect this PC, wonders malware. Let me ask my neural net...

8/9/2018

How does it work? Nobody really knows what goes on in the black box

Black Hat Here's perhaps a novel use of a neural network: proof-of-concept malware that uses AI to decide whether or not to attack a victim.…

Full Story


Anti Spam Products & Pricing


Compare Spam Blockers
Compare ClearMyMail against other spam blocker solutions.


Reviews of ClearMyMail
Read what our customers
think of our spam blocker.


Free 30 Day Spam Filter Trial
No obligation trial. Stop all virus emails and spam today.


How the spam blocker works
Find out why we are so successful
at clearing spam and virus emails.


How we block virus emails
How we stop all email viruses, Trojans and malware.


spam blocker demo Online demo/movie
Find out about the ClearMyMail Guaranteed Spam Blocker.



Contact Clear My Mail | Clear My Mail's Privacy Policy | Terms of Use for Clear My Mail  | Clear My Mail Support

Copyright © ClearMyMail Limited, 2008  -   e-mail: support@clearmymail.com
Guaranteed 100% Successful Spam Blocker