Talks & Reports
INFOGRAPHIC: Twitter Abuse – Trends & Stats
For the last several years, we’ve monitored security threats and trends on social networks like Facebook and Twitter and published reports. Every few months we present a summary of our latest findings. One of our efforts has been around understanding the presence of fake user accounts on social networks that are often used to spread spam and malware. Lately, fake accounts are not only used for malware distribution but they are also monetized by selling them as followers. Here is our latest infographic that highlights key stats about the state of fake accounts on Twitter and other attacker trends.
Cloud Integrated Storage: Free Webinar Co-presented by Forrester
Don’t Let Backup be a Drag: Cloud-Integrated Approach Makes Storing and Accessing Data Fast, Easy, and Efficient.
Backup shouldn’t be a drag on your business. But with long backup windows, even longer restore times, tedious replication chores, unreliable media, and multiple vendors, it can really make a dent in your resources.
It doesn’t have to be that way. Businesses like yours are already using new approaches to make backup faster, easier to use and manage, and more reliable. Built for today’s virtualized infrastructures and seamlessly connected to the cloud, these solutions transform backup from a drag to a breeze.
Learn all about it at an in-depth webinar featuring Forrester Research, Inc. Senior Analyst Rachel Dines.
REGISTER NOW at https://www.barracuda.com/forrester.
INFOGRAPHIC: The Underground Economy of Buying Twitter Followers: Dealers, Abusers and Fake Accounts!
Some Twitter users look for unusual ways to make themselves appear more desirable and become popular faster. One of these ways is buying Twitter followers, which right or wrong, is a significantly growing trend. INFOGRAPHIC: The Underground Economy of Buying Twitter Followers: Dealers, Abusers and fake Accounts!
INFOGRAPHIC: When Good Websites Go Bad!
A one-month snapshot of malware infections on the 25,000 most popular websites in the world. INFOGRAPHIC: When Good Websites Go Bad!
INFOGRAPHIC: Facebook User Profiles – Real People vs. Fake Profiles
To spread malware via Facebook, malicious users often create fake profiles. Because the sole purpose of this fake profile is to entice you into befriending them, there are certain detectable characteristics that set them apart from real facebook users. INFOGRAPHIC: Facebook User Profiles – Real People vs. Fake Profiles
INFOGRAPHIC: Barracuda Labs 2011 Social Networking Security & Privacy Study
The Barracuda Labs 2011 Social Networking Security & Privacy Study focuses on social networking usage, security and privacy, and is based on survey results from hundreds of users representing over 20 countries. The study was conducted over a two-week span between September and October 2011. Overall, users value security and privacy almost equally to popularity and ease of use… Barracuda Labs 2011 Social Networking Security & Privacy Study
Barracuda Labs 2010 Annual Security Report
The Barracuda Labs 2010 Annual Security Report indicates that attackers are making a shift from using email spam to more aggressively targeting the Internet. Email spam dropped by half during 2010, while search engine malware doubled and the Twitter Crime Rate increased 20 percent, signifying a concentrated focus on the more lucrative social networks and search engines as attack vectors.
Barracuda Labs 2010 Midyear Security Report
This report contains a study of Bing, Google, Twitter and Yahoo!, over a roughly two-month period. The analysis reviews more than 25,000 trending topics and nearly 5.5 million search results to identify the types of topics used by malware distributors. Additionally, Barracuda Labs analyzed more than 25 million Twitter accounts, both legitimate and malicious. The purpose of this part of the study was to measure and analyze account behavior on Twitter in order to model normal user behavior and identify features that are strong indicators of illegitimate account use.
Barracuda Labs 2009 Annual Report
This report includes a review of 2009 Web, email and social networking trends. This report specifically drills into the fastest-growing social networking application, Twitter. We reviewed 19 million Twitter accounts, analyzing both legitimate and malicious users based on the frequency and content of tweets, user-to-user interactions, and each account’s overall activity level.