• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2008

April Fool’s: The Joke’s on You

  • Posted on:March 31, 2008 at 1:42 pm
  • Posted in:Botnets, Malware
  • Author:
    Robert McArdle (Senior Threat Researcher)
3

We’ve spotted a new variant of a well-known threat cashing in on April Fool’s Day in the last few hours. Anyone want to hazard a guess as to what it is? Wasn’t that hard of a question, I guess. The Storm gang is at it again. Too lazy to actually create their own image to…

Read More

PayPal Phishing Site Arrives as Attachment

  • Posted on:March 31, 2008 at 8:21 am
  • Posted in:Bad Sites
  • Author:
    Macky Cruz (Technical Communications)
0

For the longest time now, phishers have been spamming targets with email messages that contain links to phishing sites. Last Friday, our Content Security team was able to net a phishing attempt that deviated from this “standard operating procedure.” Here are a few examples of email messages used by this phishing attack: Below is a…

Read More

Sony Playstation Network Possibly Compromised

  • Posted on:March 31, 2008 at 8:21 am
  • Posted in:Vulnerabilities
  • Author:
    Roderick Ordoñez (Technical Communications)
0

Sony claims that a possibility of unauthorized access through the PLAYSTATION®Store, a content download service of the PLAYSTATION®Network, may have occurred. This obviously compromises the millions of accounts subscribed to the said network. The full transcript is given here. However, Sony reassures its customers that only a small percentage of users are affected, and that…

Read More

WordPress 2.3.3 Invaded by Wily JavaScript

  • Posted on:March 31, 2008 at 8:15 am
  • Posted in:Vulnerabilities
  • Author:
    Jovi Umawing (Technical Communications)
3

Scores of reports flooded the Internet about WordPress 2.3.3 being hacked and exploited by a certain automated JavaScript (JS) that led users to links to various sites, which also contain the script. WordPress users and visitors reported to have encountered a phishing attempt (a wily one, too) wherein users were prompted to register to the…

Read More

Dmitry Golubov: Politician or Cyber Criminal?

  • Posted on:March 31, 2008 at 3:17 am
  • Posted in:Bad Sites
  • Author:
    Arman Capili (Technical Communications)
0

The Washington Post ran a story on a detained Ukrainian politico by the name of Dmitry Ivanovich Golubov. The 24-year-old Golubov, who ran for a public post under the Internet Party of Ukraine, was charged with credit and debit card information theft that has resulted in millions of dollars in losses for several financial institutions…

Read More
Page 1 of 912 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.