Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    October 2014
    S M T W T F S
    « Sep    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Bad Sites’ Category




    The Domain Name System (DNS) plays a vital role in the operation of the Internet. Over the years, it has been a primary target for malicious users looking for vulnerabilities in its protocol and infrastructure. Some examples include cache poisoning attacks, vulnerable DNS server implementations, and bogus user interactions. Taking advantage of users’ spelling mistakes Misspelled domain names in the browser’s address bar are a common user mistake, which attackers were quick to take advantage of. Attackers register the “squatting” or misspelled version ...

    Posted in Bad Sites |



    There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook, Google, or Microsoft for billions of dollars. It's hard enough to build a mobile app that will have the features and ease of use that will make it popular with millions of users. There are other things that apps can compete on, however: this ...

    Posted in Bad Sites, CTO Insights, Mobile |



    Late last month, we reported about a backdoor vulnerability that we discovered in Netcore/Netis brand routers, a backdoor that made any network attached to a router of the same brand vulnerable to online infiltration and man-in-the-middle attacks. We also reported on how our friends at the ShadowServer Foundation have been kind enough to scan for IP addresses affected by this vulnerability, with their findings readily available in website form. At the time, the number of affected IP addresses numbered to more than ...

    Posted in Bad Sites, Vulnerabilities |



    Earlier this year we discussed how Gizmodo's Brazilian site was compromised and used to spread online banking malware to approximately 7,000 victims in a two-hour span. The site was compromised via WordPress plugin vulnerabilities that allowed the attacker to add a script that redirected users to a second compromised site, which eventually led users to download the malware. These types of attacks are unfortunately common, but the underlying details may not be clear to all.  Attacks like these are quite capable of delivering different payloads ...

    Posted in Bad Sites |



    In the previous blog post of this series, I introduced our paper titled  An In-Depth Analysis of Abuse on Twitter  that looked at the threats in the Twitter landscape, and explained the various kinds of malicious tweets we've seen. In this post, we look at the scope and scale of these threats. Malware Tweets Users in the United States generally click the most links that go to malicious URLs from Twitter, whether it be phishing Tweets, Tweets with shortened URLs, or traditional spam. In one category, ...

    Posted in Bad Sites, Social |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice