Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    April 2014
    S M T W T F S
    « Mar    
     12345
    6789101112
    13141516171819
    20212223242526
    27282930  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Data’ Category




    This is a continuation of our previous post on Hadoop security. As we mentioned in our earlier post, we can use OSSEC to monitor for the file integrity of these existing Hadoop and HBase systems. OSSEC creates logs which a system administrator can use to check for various system events. It's worth noting that big data systems of all kinds, not just Hadoop and HBase, produce significant amounts of log data.  Installing a big data cluster is non-trivial, to say the least, and these ...

    Posted in Data | Comments Off



    There is one truly remarkable aspect about the social media services that people take for granted: they don't ask their users for anything. You can talk with as many friends, take as many selfies, post as many status messages, all without paying anything. That may be true at face value, but that's not really true. It's said that "if you're not paying for it, you're the product." In the world of social media, that's definitely true. Social media companies all need ...

    Posted in Data, Social | Comments Off



    Data exfiltration is the unauthorized transfer of sensitive information from a target’s network to a location which a threat actor controls. Because data routinely moves in and out of networked enterprises, data exfiltration can closely resemble normal network traffic, making detection of exfiltration attempts challenging for IT security groups. Figure 1. Targeted Attack Campaign Diagram Related Costs of Exfiltrated Data The costs of cyber-espionage to a target organization is only clear after the fact. Risk calculators typically consider the up-front expenses of breach ...

    Posted in Data, Targeted Attacks | Comments Off



    Much of the current discussions surrounding the growing—and inevitable—trend of consumerization are focused on the impact of bring-your-own device (BYOD) and managing the growing diversity of mobile devices. However, another aspect that IT administrators and even business owners should not forget to consider are the other consumer-oriented technologies and services employees may have access to in the workplace. Like BYOD, the benefits that come along with consumer technologies like instant messaging applications, social networking sites also bring about certain risks to ...

    Posted in Data, Mobile, Social | Comments Off



    We have released a research paper titled Email Correlation and Phishing. This paper describes, in some detail, how we use data correlation techniques to identify the "correct" senders of messages, which allows us to help identify spammers and spam/phishing messages and block them accordingly. These techniques are very useful in detecting phishing messages that try to pose as legitimate messages by organizations. In this regard, not only is it useful in targeting "conventional" phishing attempts, it may also be able to detect and ...

    Posted in Data, Spam | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice