Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Author Archive - Ryan Certeza (Technical Communications)




    Cybercriminals are fond of capitalizing on big sporting events, and it doesn’t get any bigger than the Olympics. With a worldwide audience, this prestigious event is more than just a prime target for cybercriminals, it’s a huge money-making opportunity.

    You can be sure, then, that these thieving digital miscreants are all racing to make you their latest victim. Not only that, they’re already out of the gate even before the opening ceremonies, each one eager to be the first to hand you a baton of threats.

    The first pass was made a few days ago when we detected a fraud website advertising itself on Facebook, claiming to sell tickets to the event. Upon further analysis, it was revealed to be a phishing website, created to collect personal information from unsuspecting victims.

    The second one was spotted to be targeting Japanese users. A website was found selling illegal cards that would allow users to view the Olympics for free. The website itself processes user payments in an unsafe manner, which could present certain risks to users’ financial information.

    Cybercriminals have not been slacking on the email front, either, as more than 50 spammed mails have been discovered, all of them scams related to the 2012 London Olympics. One of them claims to be a notification for an Olympic Email Lottery winner, with the user supposedly winning a large sum of cash.

    We’re sure that this is only a preview of things in terms of the relay race cybercriminals are running to take advantage of the Olympics. Do you have what it takes to make sure they don’t come in first? To help prepare yourself, check out our infographic:

     
    Posted in Social | Comments Off



    Online gaming, just like anything else involving the Internet, carries certain risks and threats that could affect your experience. These dangers, if not addressed, could also have effects that may end up with you losing not only your items and achievements, but also much more valuable things. These things include your own hard-earned cash and your privacy.

    Some of the threats an online gamer may encounter (and are tackled in our new e-guide in fuller detail):

    • Account theft – Player accounts in MMORPGs may be hacked into and stolen.
    • Scams – Deceitful players who trick other players into giving them money for fraudulent reasons.
    • Inappropriate content – Content that is inappropriate to gamers of certain ages

    This is why we made an e-guide to help online gamers secure what’s important in their gaming lifestyle. We created an outline of things an online gamer should look out for during a session, and the best practices to keep in mind during such activities.

     



    Clutter is something that appears harmless in small amounts, but can be a hassle if it accumulates. That’s why it’s a good idea to devote time into clearing it out – not just from our houses and living spaces, but also from our digital lives. Doing so not only improves our overall image, it also eliminates the possibility of any embarrassing moments when company comes over to visit (or in our digital life’s case, when someone visits our profile). Just like how a clean house is always better to live in than a messy one, a digital life that’s free from electronic rubble not only benefits us, but also those around us.

    To help you on your way, we’ve put together an e-guide containing handy tips in taking out the clutter of your digital life. Specifically this guide focuses on the three main aspects of your digital life: your desktop (or laptop, whichever applies), your mobile device, and your digital reputation.

    We also included some pointers that you can take to heart not just with those three aspects, but also in whatever you do. These can be helpful not only to keep what’s important at bay from cybercriminals, but also to ensure that those crucial data never gets lost.

    You can check out our guide in full. For additional tips, you can also check out the relevant article posted at Fearless Web here.

     
    Posted in Social | Comments Off



    In the chain of business security, humanity is the weakest link.

    Even with the most stringent and sophisticated suite of protection, the risk of your business-critical data being stolen is ever present, especially if your employees are unaware (or even worse, apathetic) of the security risk they pose. Precautions can be made against data breaches. Devices and systems can be safeguarded from outside attack.

    Despite this, every business owner should always consider the human factor as the most important one in data protection.

    To bring that same factor into focus, we here at Trend Micro worked together with research firm The Ponemon Institute, in an effort to help business owners understand this factor and  how to better address it. The summarized results of this collaborative effort is available for your perusal here. Along with this report, we also have other key materials you may find helpful:

    Click for larger view

    The human factor may be the weakest link, but that doesn’t mean it has to remain that way.

    Update as of April 4, 2012 4:06 AM (PST)

    Never underestimate the impact of the human factor when it comes to data protection. As Trend Micro’s CTO Raimund Genes states, in order to protect company assets, it is the responsiblity of security professionals to educate users on what and what not to reveal online. For more of his insights, you may watch the video The Human Factor of Targeted Attacks.

     



    Whenever something big happens – a celebrity death, a holiday, or even a highly anticipated product release – we at Trend Micro immediately scour the web looking for any ‘traps’. These ‘traps’ are set by cybercriminals in order to prey upon anyone looking for more information about that big news item. The act of tailoring these traps to relevant topics or events is called social engineering. Thousands fall prey to it every time it crops up.

    Social engineering schemes often leverage buzz-worthy events or topics to victimize users. For breaking news like calamities or notable deaths, cybercriminals work hard to churn out social engineering scams hours after the said event occurs. For instance, social engineering scams appeared just two hours after the Japan tsunami and earthquake in March. Some cybercriminals also use social engineering for events long before they occur: spam related to the 2012 Olympics appeared as early as 2008.

    Invariably, we find signs that people have been falling for these schemes time and again. In our e-guide, “5 Reasons Why Social Engineering Tricks Work,” and infographic, “Countdown to System Infection,” we discuss things users need to know about social engineering schemes. We tell what socially-engineered attacks actually look like, what they’ve been about in the past, how fast they can occur, and where you would usually find them. Most important of all, we show you what to look out for, so you can avoid becoming a victim of such scams.

     
    Posted in Bad Sites | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice