Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    September 2014
    S M T W T F S
    « Aug    
     123456
    78910111213
    14151617181920
    21222324252627
    282930  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Social’ Category




    Recently, Twitter made public financial statements related to its upcoming initial public offering (IPO). Part of these statements including how many active users it has: Twitter said it has 218 million monthly active users, three-quarters of which have accessed the site from a mobile device. It's not a surprise that some of these users are malicious. What is uncommon is that some of these malicious accounts do try to "engage" with other accounts - even those of security vendors like Trend ...

    Posted in Bad Sites, Social | Comments Off



    There is one truly remarkable aspect about the social media services that people take for granted: they don't ask their users for anything. You can talk with as many friends, take as many selfies, post as many status messages, all without paying anything. That may be true at face value, but that's not really true. It's said that "if you're not paying for it, you're the product." In the world of social media, that's definitely true. Social media companies all need ...

    Posted in Social | Comments Off



    Much of the current discussions surrounding the growing—and inevitable—trend of consumerization are focused on the impact of bring-your-own device (BYOD) and managing the growing diversity of mobile devices. However, another aspect that IT administrators and even business owners should not forget to consider are the other consumer-oriented technologies and services employees may have access to in the workplace. Like BYOD, the benefits that come along with consumer technologies like instant messaging applications, social networking sites also bring about certain risks to ...

    Posted in Mobile, Social | Comments Off



    The recent attacks on New York Times, Twitter and others while DNS-related, were not the result of a weakness in the DNS at all. They resulted from weaknesses in domain registrar infrastructure. The DNS components related to this event performed exactly as they were designed and instructed to do. While it is true that the malicious instructions were unauthorized, they followed proper channels. Evidence points to The Syria Electronic Army, but investigation is still ongoing. The breakdown came when ...

    Posted in Social | Comments Off



    One particular aspect of DEF CON that always gets some media coverage is the Social Engineering Capture the Flag (SECTF) contest, where participants use nothing more than a phone call to get victims at various Fortune 500 to give up bits of information. These are the sort of social engineering attacks that give security professionals at large enterprises nightmares. These same professionals may be in charge of programs meant to train employees on how to avoid social engineering attacks, but many ...

    Posted in Social | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice