Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    September 2015
    S M T W T F S
    « Aug    
     12345
    6789101112
    13141516171819
    20212223242526
    27282930  
  • Email Subscription

  • About Us


    Archive for the ‘Bad Sites’ Category




    How secure is online public communication? Last May, a paper was published that discusses about the Diffie-Helman (DH) crypto-strength deployment, which gives strong evidence that the current DH usage is weak and suggests that 1024-bit size parameters can be broken with a nation state’s computing power resources. The paper presents possible scenarios where such an incident could occur. They found, for example, that 17.9% of HTTPS connections to sites that are part of the Alexa Top 1M sites can be eavesdropped without the traffic being modified ...

    Posted in Bad Sites |



    We've noticed a recent increase in TorrentLocker-related emails being sent to users in several countries, particularly the United Kingdom and Turkey. From the latter half of May until June 10, there was a relative lull in TorrentLocker-related emails. However, over a period of just over two weeks (June 10 to June 28), we saw a recurrence of this threat. In late 2014, TorrentLocker, a family of crypto-ransomware, was observed to have affected Italy. Australia used to be the major target of these attacks ...

    Posted in Bad Sites, Malware |



    Mention the “Deep Web” and most people will instantly associate it with the part of the Internet used for nefarious and illegal activities. For others, it is this inaccessible side of the Web, the one that requires a lot of technical skill and know-how to reach. Although these assumptions are somewhat correct, they only cover a small portion of the Deep Web as a whole. For over two years, Trend Micro’s Forward-Looking Threat Research Team (FTR) has done extensive exploration of ...




    MadAdsMedia, a US-based web advertising network, was compromised by cybercriminals to lead the visitors of sites that use their advertising platform to Adobe Flash exploits delivered by the Nuclear Exploit Kit. Up to 12,500 users per day may have been affected by this threat; three countries account for more than half of the hits: Japan, the United States, and Australia. Figure 1. This attack was first seen in April, although at relatively low traffic levels. The number of users at risk grew significantly as May ...




    We have been able to identify a new point-of-sale (PoS) malware family that has affected more than 100 victim organizations in Brazil. We have dubbed this new malware family as "FighterPOS". This name is derived from BRFighter, the tool used by the author to create this new threat. This one-man operation has been able to steal more than 22,000 unique credit card numbers. Its creator appears to have had a long history in carding, payment scams, and malware creation; in addition we ...

    Posted in Bad Sites | Comments Off on One-Man PoS Malware Operation Captures 22,000 Credit Card Details in Brazil


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice