Sorin Mustaca documents common and emerging phishing techniques.
Martin Overton describes an unusual phishing scam in which traditional social engineering phishing techniques are combined with a malware download that renders the victim PC unbootable once the phishing deed has been done.
The effectiveness of content-based spam filters is directly related to the quality of the features used in the filter’s classification model. Vipul Sharma and Steve Lewis discuss how retiring features that have become ineffective can improve the filter's performance.
Darknet monitoring (comment); Hidan and dangerous (analysis); Peerbot: catch me if you can (feature); Real-world testing of email anti-virus solutions (feature); The strange case of Julie Amero (letter); AEC TrustPort Workstation (product review)