• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for February 2011

Following the Money: Evolving Cybercrime Techniques and Targets

  • Posted on:February 25, 2011 at 10:21 am
  • Posted in:Malware, Spam
  • Author:
    JM Hipolito (Technical Communications)
8

Online transactions offer great convenience to both vendors and customers alike. It provides a means to conduct transactions that are better suited to most users’ current lifestyle, which increasingly involves the Internet. Unfortunately, this increased dependency on online banking and e-commerce is directly proportional to cybercriminals’ interest on how to leverage this to their advantage. Recently we’ve…

Read More

From RSA 2011: Security, Social Media and Spies

  • Posted on:February 24, 2011 at 11:46 pm
  • Posted in:Social
  • Author:
    Menard Osena (Senior Product Manager)
4

Like my colleagues, I also attended RSA 2011 Conference in San Francisco last week. As they have shared in their posts on the hackers and threats sessions, I would like to share some of my experiences and learnings on sessions involving social media, spies and security. Mapping an Organization’s DNA Using Social Media Abhilash Sonwane…

Read More

Facebook Stalker Tracker Tool Turns Users into Spammers

  • Posted on:February 23, 2011 at 1:35 am
  • Posted in:Social, Spam
  • Author:
    Paul Pajares (Fraud Analyst)
19

Privacy has been one of the major concerns of Facebook users today, especially as the social network continues to increasingly grow to become a massive directory of personal information. Users are becoming very concerned as to who can access the information they post, fearful that these may be viewed and used in a malicious way. Given this, stalkers—people…

Read More

From RSA 2011: Mobile Security in Today’s Threat Landscape

  • Posted on:February 23, 2011 at 1:30 am
  • Posted in:Mobile
  • Author:
    Ria Rivera
10

One of the primary points raised in this year’s RSA Conference is that mobile threats are as real and pressing as other industry issues today. Amid heated discussions over cloud security, several sessions were spent on reviewing the threats to mobile security and on laying out concrete steps so we can defend our mobile lives. The Ugly…

Read More

SpyEye/ZeuS Toolkit v1.3.05 Beta Part 2

  • Posted on:February 22, 2011 at 8:51 am
  • Posted in:Botnets, Malware
  • Author:
    Loucif Kharouni (Senior Threat Researcher)
9

Since our previous blog post, we continued to investigate whether or not SpyEye 1.3.x is indeed the result of the ZeuS-SpyEye merger. So far, we realized that the included documentation doesn’t say much about ZeuS. It only compared the behaviors of several options/configurations of the two malware families. At present, we have only been able…

Read More
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.