Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    September 2014
    S M T W T F S
    « Aug    
     123456
    78910111213
    14151617181920
    21222324252627
    282930  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Social’ Category




    There is one truly remarkable aspect about the social media services that people take for granted: they don't ask their users for anything. You can talk with as many friends, take as many selfies, post as many status messages, all without paying anything. That may be true at face value, but that's not really true. It's said that "if you're not paying for it, you're the product." In the world of social media, that's definitely true. Social media companies all need ...

    Posted in Social | Comments Off



    Much of the current discussions surrounding the growing—and inevitable—trend of consumerization are focused on the impact of bring-your-own device (BYOD) and managing the growing diversity of mobile devices. However, another aspect that IT administrators and even business owners should not forget to consider are the other consumer-oriented technologies and services employees may have access to in the workplace. Like BYOD, the benefits that come along with consumer technologies like instant messaging applications, social networking sites also bring about certain risks to ...

    Posted in Mobile, Social | Comments Off



    The recent attacks on New York Times, Twitter and others while DNS-related, were not the result of a weakness in the DNS at all. They resulted from weaknesses in domain registrar infrastructure. The DNS components related to this event performed exactly as they were designed and instructed to do. While it is true that the malicious instructions were unauthorized, they followed proper channels. Evidence points to The Syria Electronic Army, but investigation is still ongoing. The breakdown came when ...

    Posted in Social | Comments Off



    One particular aspect of DEF CON that always gets some media coverage is the Social Engineering Capture the Flag (SECTF) contest, where participants use nothing more than a phone call to get victims at various Fortune 500 to give up bits of information. These are the sort of social engineering attacks that give security professionals at large enterprises nightmares. These same professionals may be in charge of programs meant to train employees on how to avoid social engineering attacks, but many ...

    Posted in Social | Comments Off



    In continuing our research on scams that offer free followers to Instagram users, we found out that similar services for other social networks are also available online. Among those that we found is this particular Russian site that comes off as a one-stop-shop for those looking to purchase followers, likes, retweets, and other activities for social networks like Twitter, Google+, Facebook, and Instagram. Figure 1. Scam site selling followers for different social networks The required payment would depend on the number of followers, ...

    Posted in Bad Sites, Social | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice