Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    August 2014
    S M T W T F S
    « Jul    
     12
    3456789
    10111213141516
    17181920212223
    24252627282930
    31  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Social’ Category




    Much of the current discussions surrounding the growing—and inevitable—trend of consumerization are focused on the impact of bring-your-own device (BYOD) and managing the growing diversity of mobile devices. However, another aspect that IT administrators and even business owners should not forget to consider are the other consumer-oriented technologies and services employees may have access to in the workplace. Like BYOD, the benefits that come along with consumer technologies like instant messaging applications, social networking sites also bring about certain risks to ...

    Posted in Mobile, Social | Comments Off



    The recent attacks on New York Times, Twitter and others while DNS-related, were not the result of a weakness in the DNS at all. They resulted from weaknesses in domain registrar infrastructure. The DNS components related to this event performed exactly as they were designed and instructed to do. While it is true that the malicious instructions were unauthorized, they followed proper channels. Evidence points to The Syria Electronic Army, but investigation is still ongoing. The breakdown came when ...

    Posted in Social | Comments Off



    One particular aspect of DEF CON that always gets some media coverage is the Social Engineering Capture the Flag (SECTF) contest, where participants use nothing more than a phone call to get victims at various Fortune 500 to give up bits of information. These are the sort of social engineering attacks that give security professionals at large enterprises nightmares. These same professionals may be in charge of programs meant to train employees on how to avoid social engineering attacks, but many ...

    Posted in Social | Comments Off



    In continuing our research on scams that offer free followers to Instagram users, we found out that similar services for other social networks are also available online. Among those that we found is this particular Russian site that comes off as a one-stop-shop for those looking to purchase followers, likes, retweets, and other activities for social networks like Twitter, Google+, Facebook, and Instagram. Figure 1. Scam site selling followers for different social networks The required payment would depend on the number of followers, ...

    Posted in Bad Sites, Social | Comments Off



    We spotted yet another threat lurking around social media sites targeting users of either Google Chrome or Mozilla Firefox. This threat uses fake extensions for both browsers to infiltrate user systems and hijack social media accounts - specifically, Facebook, Google+, and Twitter accounts. To install these fake extensions, users would see various lures on social media sites to try to get users to install a fake video player update. In reality, this player update is a malicious file detected as TROJ_FEBUSER.A, installs a ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice