Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Mobile Vulnerabilities

  • Zero-Day Alerts

  • Recent Posts

  • Calendar

    August 2015
    S M T W T F S
    « Jul    
     1
    2345678
    9101112131415
    16171819202122
    23242526272829
    3031  
  • Email Subscription

  • About Us


    Archive for the ‘Social’ Category




    In the previous blog post of this series, I introduced our paper titled  An In-Depth Analysis of Abuse on Twitter  that looked at the threats in the Twitter landscape, and explained the various kinds of malicious tweets we've seen. In this post, we look at the scope and scale of these threats. Malware Tweets Users in the United States generally click the most links that go to malicious URLs from Twitter, whether it be phishing Tweets, Tweets with shortened URLs, or traditional spam. In one category, ...

    Posted in Bad Sites, Social | Comments Off on Investigating Twitter Abuse, Part 2



    Twitter is an important means of communication for many people, so it shouldn't be a surprise that it has become a medium that is exploited by cybercriminals as well. Together with researchers from Deakin University, we have released an in-depth paper titled An In-Depth Analysis of Abuse on Twitter that looks at the scale of this threat. To gather this information, we analyzed publicly accessible Tweets from a two-week period in 2013. Many of these we discarded, as they did not have ...

    Posted in Social | Comments Off on Investigating Twitter Abuse, Part 1



    Cybersecurity is an important part of our daily lives, whether people are aware of it or not. Building awareness that being secure online is everyone's responsibility is a key part of fighting cybercrime. This is why one of the themes of this year's National Cyber Security Awareness Month is the  'Stop. Think. Connect™' campaign, which promotes this very message. Learning how to be secure online is difficult without knowing about how one can be infected. So how do today's users become victims ...

    Posted in Social | Comments Off on National Cybersecurity Awareness Month: How Do Users Become Victims?



    With the entire internet abuzz about the iCloud hacking leak - where more than a hundred celebrities had their private photos leaked online- it would certainly only be a matter of time before some enterprising cybercriminal decided that things were ripe for leveraging with socially-engineered threats. And that's just what happened, as our scanning brought to our attention some freshly-concocted schemes targeting those looking for the photos borne from the aforementioned leak. The first threat we found hails from Twitter, in the ...




    We're seeing schemes that are taking advantage of the buzz around the upcoming developer preview release of Windows™ 9 this September. One of the threats we saw was found using some combinations of keywords like Windows 9, free, leak and download in popular search engines. It involves a potentially malicious website that offers what appears to be a free download of the yet-to-be-released Windows OS. Figure 1. Blog offering free Windows 9 download Users who click the 'Download Now' button will be redirected to a download page provided by the file-hosting service Turbobit.net. The file being ...

    Posted in Bad Sites, Social | Comments Off on Cybercriminals Leverage Rumored Windows 9 Developer Preview Release With Social Engineering


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice