• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for April 2009

Invoice Spam Finds New Target: WorldPay

  • Posted on:April 30, 2009 at 4:08 am
  • Posted in:Bad Sites
  • Author:
    Aljerro Gabon (Anti-spam Research Engineer)
3

After spam runs related to UPS, FedEx, and Western Union, another form of invoice spam strikes again! We caught a new invoice spam that is purportedly from WorldPay, a division of the Royal Bank of Scotland that specializes in handling secure online payments from all over the world. The spammed email message informs users that…

Read More

Swine Flu Outbreak Hits The Web Through Spam

  • Posted on:April 28, 2009 at 5:40 am
  • Posted in:Spam
  • Author:
    Adrian Labiano (Anti-spam Research Engineer)
13

After the World Health Organization raised its global alert level on the spreading swine flu virus, Spammers quickly used this event for their spam campaigns. Early this morning, we have seen spam samples using Swine flu worldwide! or Swine flu outbreak! as their email subject. Spammers are using this social engineering technique because having the…

Read More

Terra Spam Targets Portuguese-Speaking Users

  • Posted on:April 27, 2009 at 1:01 am
  • Posted in:Malware, Spam
  • Author:
    Argie Gallego (Anti-spam Research Engineer)
2

They say the Internet is making the world smaller. Whether that’s the case for the rest of us is debatable or not, but for one group of people it’s definitely true: spammers. Consider this new sample that our team came across recently: It appears to come from the Brazilian portal site Terra. That, in itself,…

Read More

Unscrupulous Russian Cybercriminals Attempt to Capitalize on Grisly Death

  • Posted on:April 26, 2009 at 8:40 pm
  • Posted in:Bad Sites
  • Author:
    Paul Ferguson (Senior Threat Researcher)
4

Nikki Catsouras Let’s face it — cybercriminals never squander an opportunity to take advantage of potential victims’ curiosity, no matter how unethical, sick & twisted, or unscrupulous. Look at the tragic death of film star Heath Ledger. His untimely death was immediately used by cyber criminals to lure victims into their malware lair. But this…

Read More

Fake Form W-8BEN Used in IRS Tax Scams

  • Posted on:April 22, 2009 at 12:30 am
  • Posted in:Spam
  • Author:
    Maria Alarcon (Anti-spam Research Engineer)
6

Every year, April 15th marks the deadline for the submission of tax returns in the US, and with it comes the now-classic IRS (Internal Revenue Service) scam. Scammers are on the hunt for those who were not able to file their tax statements yet. Knowing how busy people are these days, scammers have taken advantage…

Read More
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.