• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2010

Spike in File Infectors Highlight Continuing Threat

  • Posted on:March 31, 2010 at 4:10 am
  • Posted in:Bad Sites
  • Author:
    Julius Dizon (Research Engineer)
1

In the past week, TrendLabs noticed a significant growth in the number of file infectors in the wild, particularly in Latin America. A significant increase in PE_SALITY.BA cases was particularly spotted in the region. A rise in VIRUX variants, particularly PE_VIRUX.R, was also spotted at around the same time. File infectors are not a new…

Read More

Web Browsers Get “Owned” in “2010 Pwn2Own”

  • Posted on:March 31, 2010 at 3:53 am
  • Posted in:Vulnerabilities
  • Author:
    Danielle Veluz (Technical Communications)
1

“2010 Pwn2Own” is an annual contest wherein contestants are invited to hack a variety of Web applications and platforms such as Web browsers and mobile phones for cash prizes and benefits. Successful hackers include Dutch hacker Peter Vreugdenhil for Internet Explorer (IE) 8, German hacker “Nils” for Firefox, and Charlie Miller for Safari. What About…

Read More

Apple Fixes 88 Bugs as MS Prepares Out-of-Band Patch

  • Posted on:March 30, 2010 at 12:57 am
  • Posted in:Vulnerabilities
  • Author:
    Ria Rivera
5

Apple Fixes Several Bugs Releasing one of its biggest Mac OS X security updates, Apple fixes 88 vulnerabilities with Security Update 2010-002/Mac OS X v10.6.3. The update addresses critical issues that can lead to arbitrary code execution, information disclosure, and denial-of-service (DoS) attacks. One of the critical fixes included is the solution for the AppKit issue, which can lead…

Read More

Kids’ Choice Awards Used for FAKEAV

  • Posted on:March 30, 2010 at 12:53 am
  • Posted in:Bad Sites
  • Author:
    Sheryll Tiauzon (Advanced Threats Researcher)
3

It seems that cybercriminals use every bit of news or information worthy of public interest to spread FAKEAV malware. This time around, FAKEAV binaries are being delivered via news about the recently concluded “2010 Kids’ Choice Awards.” The following keywords lead to poisoned Google search results (see Figure 1): Kids Choice Awards 2010 Live Kids…

Read More

Search for News on Moscow Subway Explosions Result in FAKEAV

  • Posted on:March 29, 2010 at 1:06 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Carolyn Guevarra (Technical Communications)
3

News of a twin bombing attack in Russia shocked the world on Monday morning as two female suicide bombers blew themselves up in Moscow subway stations. According to news reports, the attacks killed at least 38 and wounded more than 60 people. Jumping at the chance to make profit from terrible events, cybercriminals quickly picked…

Read More
Page 1 of 912 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.