• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2011

Private Browsing

  • Posted on:March 25, 2011 at 8:06 am
  • Posted in:Bad Sites
  • Author:
    David Sancho (Senior Threat Researcher)
12

Chrome, Firefox, and Internet Explorer released major updates this week. The timing may be a coincidence or not but there is a very interesting feature that all three browsers are developing almost at the same time—private browsing. The Federal Trade Commission (FTC) issued a privacy report late last year that endorsed the privacy browsing feature. The…

Read More

A Stark Message to Cybercriminals: You Are Not Invisible, You Are Not Beyond the Law

  • Posted on:March 21, 2011 at 8:00 am
  • Posted in:Botnets
  • Author:
    Ranieri Romera (Senior Threat Researcher)
15

Around the world, every day, security researchers study the activities, behaviors, forum communications, and networks of cybercriminals in an effort to make the world safe for the exchange of digital information. In addition to preventing attacks, we gather and share intelligence with the appropriate industry anti-cybercrime groups and law enforcement authorities. We’ve been tracking for one particular…

Read More

The Final Nail on Rustock’s Coffin—Or Is It?

  • Posted on:March 19, 2011 at 2:04 am
  • Posted in:Botnets, Spam
  • Author:
    Jamz Yaneza (Threat Research Manager)
7

The successful takedown can be considered the most recent and—possibly most effective—nail yet on Rustock’s coffin. While we have to wait before we can see the long-term effects of the recent Rustock botnet takedown, the decline in spam volume is apparent. Data from TrendLabsSM shows a more than 95 percent decrease in Rustock reports on March 16,…

Read More

Excel File Containing Adobe Zero-Day Exploit Found

  • Posted on:March 16, 2011 at 8:32 pm
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    JM Hipolito (Technical Communications)
9

We got hold of an exploit targeting the vulnerability Adobe reported in its most recent security advisory. The exploit, detected as TROJ_ADOBFP.B (now detected as TROJ_ADOBFP.SM), takes advantage of the referenced vulnerability to drop another malicious file detected as TROJ_DROPPER.ADO. TROJ_ADOBFP.B arrives in users’ systems as a malicious .SWF file that has been embedded into an .XLS file. This .SWF…

Read More

Third-Generation QAKBOT: Repackaged with Improved Propagation

  • Posted on:March 15, 2011 at 5:53 pm
  • Posted in:Malware
  • Author:
    Jessa De La Torre (Senior Threat Researcher)
9

It has been said that 2011 is the year of sequels in the movie industry and it seems that malware authors are also taking cues from their Hollywood counterparts. It is only the first quarter of the year but we have already seen a number of revamps of previous well-known malware. The new year started off with the Waledac…

Read More
Page 2 of 5 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.