Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    October 2014
    S M T W T F S
    « Sep    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Exploits’ Category




    After introducing the "isolated heap" in June security patch for Internet Explorer, Microsoft has once again introduced several improvements in the July patch for Internet Explorer. The most interesting and smart improvement is one which we will call “delay free.” This improvement is designed to mitigate Use After Free (UAF) vulnerability exploits by making sure Internet Explorer does not free object‘s heap space immediately when its reference count is zero. Take Internet Explorer 11, for example. We randomly selected the class CDivElement. ...

    Posted in Exploits, Vulnerabilities | Comments Off



    While wearable personal technology may be the most "public" face of the Internet of Everything, the most widespread use of it may be in smart meters. What is a smart meter, exactly? It's a meter for utilities (electricity, gas, or water) that records the consumption of the utility in question, and transmits it to the utility provider via some sort of two-way communication method. (Examples of these methods include a wireless mesh network, power line networking, or a connection to the user's ...




    We have been dealing with targeted attacks and know that there is no single technology that can practicably defend an organization’s network against these high-impact campaigns. This is sad, true, but it does mean there are ways to harness security technologies like sandboxing and heuristic scanning so that they work together to protect as a stronger whole. The use of heuristics and sandboxing as complementary technologies that cover each other’s weaknesses serves as an effective and efficient way in identifying unknown threats ...

    Posted in Exploits, Targeted Attacks | Comments Off



    Evolution is a continuous process, and nothing can exemplify the process better in our industry than the threats we defend against. From simple pranks and nuisances, they've become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for the sake of money. They've also become tools for activists and terrorists of the cyber variety, used to make strong statements against governments or organizations. But as such threats evolve, so must the security solutions that defend against them, ...

    Posted in Exploits, Malware, Mobile | Comments Off



    The use of contextually-relevant emails is one of the most common social engineering tactics employed in targeted attacks.  Emails still being the primary mode of business communications are often abused to deliver exploits to penetrate a network that consequently lead to other stages of a targeted attack cycle. In one of the targeted attacks we’re monitoring, threat actors used the news of a plane crash that killed the deputy prime minister of Laos.  The email message bore the subject line BREAKING: ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice