Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    August 2012
    S M T W T F S
    « Jul   Sep »
  • Email Subscription

  • About Us

    Archive for August 20th, 2012

    Privacy remains a hot topic in the digital age. We’ve previously discussed certain aspects about online privacy such as the Do Not Track function in browsers and personalized advertising. However, it appears that a lot of users are still unaware of how to keep their information private. For instance, according to Consumer Reports, 13 million users have never set Facebook’s privacy tools. A Pew Research report found that only 38 percent were aware of ways on how to limit the amount of information they put online.

    Keeping your personal information private is important because your data is valuable. Users are well aware that cybercriminals want data related to financials, such as credit card information, online banking credentials, and Paypal accounts. However, they may not know that seemingly harmless or useless data (e.g., gender or likes) is also important —to marketers. Marketers need user data to make sure that the right message is sent to the right demographic.

    But how do cybercriminals and marketers get your data? What happens once data is made available publicly? To know the answers and for additional information about your data, check out our latest infographic, “Hot on Your Trail: How Much is Your Data Worth?”

    Coming Soon: The TrendLabs Security Intelligence Blog will be the new Malware Blog

    Posted in Bad Sites | Comments Off on Hot on Your Trail: How Much is Your Data Worth?

    This is part of a series of blog posts discussing the Chinese underground. The previous parts may be found here:

    The full paper can be found here.

    Virtual assets – in the form of currency, equipment, or membership in online games – have significant real-world value as well. This is particularly true in China, were online games are a very popular form of entertainment.

    Despite this real-world value, laws to protect virtual asset theft are neither well developed nor effectively enforced. Because of this, some members of the Chinese underground prefer to target these kinds of assets rather than real-money items.

    The diagram below illustrates the value chain of virtual assets theft in China:

    Broadly speaking, the value chain has three phases: first, the login credentials for online games are stolen via malware or phishing. In the next phase, the credentials are used to steal virtual assets such as in-game money, equipment, or even the account itself. Finally, the crime is monetized by selling these in online marketplaces – for real money.
    Read the rest of this entry »

    Posted in Malware | Comments Off on The Chinese Underground, Part 3: Virtual Assets Theft


    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice