• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for February 2009

A Second Rogue Facebook Application in Just a Week?

  • Posted on:February 26, 2009 at 11:57 pm
  • Posted in:Spam
  • Author:Rik Ferguson (VP, Security Research)
13

In a second attack, extremely reminiscent of the one that took place this weekend, Facebook users have once again been victimized by cybercriminals. Reports started surfacing this afternoon of yet another rogue Facebook application posting notifications to user profiles that said: (Name on my friend’s list) has just reported you to Facebook for violating our…

Read More
Tags: Facebookrogue pplication

UK Justice Minister Jack Straw’s Account Used for 419 Scam

  • Posted on:February 26, 2009 at 3:40 am
  • Posted in:Bad Sites
  • Author:Rik Ferguson (VP, Security Research)
2

UK Justice Secretary Jack Straw had his web-based email account compromised last Thursday. Jack Straw, former Home Secretary, used a Hotmail account as his sole public email address. Figure 1. Jack Straw’s contact information from http://www.jackstrawmp.org.uk/contactus.asp In a variation of a theme currently being used on social networking sites, 419 scammers used the compromised account…

Read More

Rogue Facebook App Linked to Blackhat SEO

  • Posted on:February 26, 2009 at 3:36 am
  • Posted in:Bad Sites
  • Author:Rik Ferguson (VP, Security Research)
15

Over the weekend, an application of extremely dubious intent was released on Facebook. Called “The Error Check System“, this said application appears to be non-destructive, but spread very quickly and very widely and could in the process have collected thousands, hundreds of thousands even, of personal details. The application sent out notifications to Facebook users…

Read More

Xbox Live Losers Resort to Hacking

  • Posted on:February 25, 2009 at 4:50 am
  • Posted in:Bad Sites
  • Author:
    Jake Soriano (Technical Communications)
2

Xbox Live users, specifically winning players, are being targeted by hackers. Researchers believe that the attacks are done so other Xbox Live users could get back at the players who beat them in a game. A BBC report explains that the tools used in this hacking attack do not target the Xbox Live network but…

Read More
Tags: Xbox Live

Gmail Downtime Exposes Ad-Rigged Site

  • Posted on:February 25, 2009 at 4:46 am
  • Posted in:Malware
  • Author:
    JM Hipolito (Technical Communications)
2

The Gmail downtime experienced today may have caused a nasty ruckus by frustrated users, but unknown to these users is an issue bigger than not being able to access email messages. In the midst of the commotion brought about by the outage lasting only a few hours, cybercriminals managed to squeeze in an attempt to…

Read More
Tags: Gmail
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.