• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for October 2005

Mixed Threat Part 2: They Come Through Emails!

  • Posted on:October 27, 2005 at 3:45 am
  • Posted in:Bad Sites
  • Author:
    Jhoevine Capicio (Threats Analyst)
0

The thing about this is that one malware creates a link of event which ultimately leads a system to be infected with a number of other malwares. From one malware the execution goes to another one until the flow is finished, which by this time the system is already infected with anything that comes up…

Read More

A Mixed Threat Adventure

  • Posted on:October 27, 2005 at 3:44 am
  • Posted in:Bad Sites
  • Author:
    Jhoevine Capicio (Threats Analyst)
0

Mixed threats are becoming more and more common nowadays. Most of the times, users don’t even know what hit them until it’s too late. Just visit a site, which REALLY looks like a legitimate one by the way, and presto – you have your instant adwares, spywares, backdoors, trojans or even worms roaming free and…

Read More

Stalking the Fanbot

  • Posted on:October 27, 2005 at 3:42 am
  • Posted in:Bad Sites
  • Author:
    Ivan Macalintal (Threat Research Manager)
0

Brief HistoryDuring the first quarter of 2005, the advent of the family of mass-mailing bot-worms called MYTOBs gave rise to the vast proliferation of so-called BOT creators or groups that thrive on and make use of the modularity, functionality and “effectiveness” of the open-source codes. I will refer to the MYTOB open source as “Hellbot”…

Read More

New Skype Vulnerabilities

  • Posted on:October 27, 2005 at 3:41 am
  • Posted in:Bad Sites
  • Author:
    Jhoevine Capicio (Threats Analyst)
0

New Vulnerabilities in Skype, a little program for making free calls over the internet, announced two vulnerabilities in its code. Read more about it here and here. So for Skype users out there, an updated version which addresses the vulnerabilities mentioned above is already uploaded in this site.

Read More

(Yet Another) URL Spoofing Bug

  • Posted on:October 21, 2005 at 12:02 pm
  • Posted in:Bad Sites
  • Author:
    Joey Costoya
0

Another URL spoofing in at least two browsers has been discovered. It was first reported as a URLspoofing vulnerability in Internet Explorer. Subsequent discussions later revealed that Firefox is also vulnerable.To create such a bug, start off with a simple link tag: <a href=””> </a>Then within that tag, include an onClick() event. This event is…

Read More
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.