Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    February 2015
    S M T W T F S
    « Jan    
    1234567
    891011121314
    15161718192021
    22232425262728
  • Email Subscription

  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Author Archive - Danielle Veluz (Technical Communications)




    Microsoft released 13 bulletins today instead of 14, as announced in the Patch Tuesday announcement some days ago. In their final Patch Tuesday for the year, Microsoft addressed bugs in Windows, Internet Explorer, and Microsoft Office, while adding in a fix for DUQU in the bulletin MS11-087, which is also known as the DUQU zero-day remote code execution flaw. Attackers embedding specially crafted TrueType fonts in documents can exploit this vulnerability in the Windows kernel. MS11-087 was given a ‘Critical’ rating.

    MS11-092 also deserves attention in this security bulletin as it affects Windows Media Player and also allows an attacker remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. Microsoft also includes fixes for Active Directory, OLE and the Windows kernel.

    To lean more about Microsoft support for the affected software, more details on the security bulletins for December can be found in their official bulletin summary. Users may also refer to our Trend Micro security advisory page.

    Users of Deep Security and OfficeScan with Intrusion Defense Firewall (IDF) plug-in can also find updates to their products that will protect them from threats exploiting the vulnerabilities made public today, in advance of IT administrators being able to roll out these patches to their systems.

     
    Posted in Vulnerabilities | Comments Off




    System administrators are in for a light Patch Tuesday this month as Microsoft released only four bulletins in its monthly security update.

    The Microsoft Security Bulletin Summary for November 2011 tackles and addresses multiple vulnerabilities in Microsoft Windows. According to the notice, one of the bulletins is rated “critical”, while two are rated “important” and remaining one is rated “moderate.”

    Majority of the bulletins apply to newer versions of Windows and require a reboot. The critical bulletin only affects Windows Vista, Windows 7, and Windows 2008 Server R2.

    This Patch Tuesday gave a break to many IT administrators, however the real question on everyone’s mind is zero-day vulnerability related to DUQU. The vulnerability is exploited through a malicious Microsoft Word document. When opened, a zero-day kernel vulnerability is taken advantage of to execute malicious code. Microsoft did not release a patch in this cycle but has already issued a temporary fix for the exploit found here. The advisory provides a workaround by disabling the rendering of embedded TrueType fonts.

    Additionally, Microsoft also raised their concern on the exploitability of MS11-083, giving it an Exploitability Index of “2”. They gave several scenarios wherein the vulnerability is exploited, and eventually used to achieve remote code execution.

    Users are advised to immediately download and apply these patches as soon as possible. For more information regarding this month’s Patch Tuesday release, visit the Trend Micro security advisory page.

     
    Posted in Exploits, Vulnerabilities | Comments Off



    Today, I received an email from Apple telling me that there was a change in my account information. Seeing that I had already changed it a few weeks ago, I was rather curious to see what this email from “Apple” had to say. After opening the message, I was surprised to see an uncanny and almost identical resemblance with the legitimate email from Apple I got a few weeks back. See the side-by-side comparisons below:

    Click for larger view Click for larger view

    Read the rest of this entry »

     
    Posted in Spam | TrackBacks (2) »



    Microsoft issued a new batch of security bulletins for October with fixes for several vulnerabilities in software products used by millions of computer users worldwide. Eight security bulletins have been released, which include patches for 23 vulnerabilities for software such as Microsoft .NET Framework, Microsoft Silverlight, Internet Explorer, Microsoft Forefront United Access Gateway, and Microsoft Host Integration Server.

    Six out of the eight bulletins are rated “important” while two are rated “critical.” Some of the patches indicated a required restart after updating the machine with the affected software. Users and administrators are advised to immediately address these security flaws.

    Users may refer to our vulnerability page for more information.

    With a plethora of devices now entering the work environment, consumerization proves to be an IT nightmare and an increasing security risk, especially in terms of making sure all devices connected to the network are updated accordingly. With that, a lack of strategy could prove devastating and user-liable devices can get infected simply by surfing the Web or by being used in an unsecure environment. It is critical for users who bring their personal devices to their workplace to make sure that they update their systems with the latest security updates as soon as these are made available.

    To learn more about Microsoft support for the affected software, more details on the security bulletins for October can be found in the vendor’s¬†official bulletin summary.

     



    Online threats and malware have been plaguing Internet users for more than 20 years now. While today’s cybercsecurity headlines often refer to the latest data breaches, Facebook scams, and the 1410% increase in the Android malware volume, it is interesting to note that the tools cybercriminals use today are, in a sense, the BRAIN-child (pun intended) of two Pakistani brothers who ironically wanted to do good and to prevent software piracy. From the PC boom in the 1980s to the rise of the Internet and connectivity from the 1990s to the 2000s, Trend Micro has been closely monitoring technological advancements in information exchange as well as how malware and online threats grew from their roots as pesky computer viruses to the notorious information-stealing programs of today.

    At present, Trend Micro sees 3.5 new threats per second. As more and more businesses and home users take the inevitable journey to the cloud, risks of data and financial loss are greater than ever. Trend Micro also continues to uncover cybercrime operations and how bad guys earn millions of dollars, pointing to an underground economy that matures with time.

    Our new infographic, “Threat Morphosis: The Shifting Motivations Behind Digital Threats,” offers a look into the evolving cybercrime motivations and the resulting shifts in the threat landscape through the years.

    Click here for a detailed look at the thumbnail image below.

     


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice