Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    August 2014
    S M T W T F S
    « Jul    
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Social’ Category

    The recent attacks on New York Times, Twitter and others while DNS-related, were not the result of a weakness in the DNS at all. They resulted from weaknesses in domain registrar infrastructure. The DNS components related to this event performed exactly as they were designed and instructed to do. While it is true that the malicious instructions were unauthorized, they followed proper channels. Evidence points to The Syria Electronic Army, but investigation is still ongoing. The breakdown came when ...

    Posted in Hacked Sites, Social | Comments Off

    One particular aspect of DEF CON that always gets some media coverage is the Social Engineering Capture the Flag (SECTF) contest, where participants use nothing more than a phone call to get victims at various Fortune 500 to give up bits of information. These are the sort of social engineering attacks that give security professionals at large enterprises nightmares. These same professionals may be in charge of programs meant to train employees on how to avoid social engineering attacks, but many ...

    Posted in Social | Comments Off

    In continuing our research on scams that offer free followers to Instagram users, we found out that similar services for other social networks are also available online. Among those that we found is this particular Russian site that comes off as a one-stop-shop for those looking to purchase followers, likes, retweets, and other activities for social networks like Twitter, Google+, Facebook, and Instagram. Figure 1. Scam site selling followers for different social networks The required payment would depend on the number of followers, ...

    Posted in Bad Sites, Social | Comments Off

    We spotted yet another threat lurking around social media sites targeting users of either Google Chrome or Mozilla Firefox. This threat uses fake extensions for both browsers to infiltrate user systems and hijack social media accounts - specifically, Facebook, Google+, and Twitter accounts. To install these fake extensions, users would see various lures on social media sites to try to get users to install a fake video player update. In reality, this player update is a malicious file detected as TROJ_FEBUSER.A, installs a ...

    As more and more users entrust parts of their digital lives to the cloud, they're increasingly running into a problem: it doesn't always last forever. More specifically, cloud services that people have relied upon are just like any other business: they can close their doors. Just in the past few weeks, here are some cloud services that have shut down or drastically changed their offerings: Boxee (set-top box and online digital video recorder) Google Reader (RSS reader) MySpace (social network) SnapJoy (photo library) SimSocial (gaming) But some changes to these services ...

    Posted in Data, Social | 1 TrackBack »


    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice