• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2011

More on the Tatanga Banking Trojan

  • Posted on:March 7, 2011 at 2:50 am
  • Posted in:Bad Sites
  • Author:
    David Sancho and Kevin Stevens (Senior Threat Researchers)
6

Since the Tatanga Trojan (TSPY_PINCAV.GEK) made it to the news last week, thanks to the terrific work of fellow researchers at S21Sec, the Trend Micro research team has been hard at work to find out more about this malware. Luckily, we managed to obtain access to a command-and-control (C&C) server, giving us the opportunity to gather…

Read More

Trojanized Apps Root Android Devices

  • Posted on:March 4, 2011 at 4:59 pm
  • Posted in:Mobile
  • Author:
    Karl Dominguez (Threat Response Engineer)
10

Mobile threats are reaching new heights today and the Android platform is becoming a favorite of attackers. Google made the Android platform as “open” as possible and released application development documentations, source codes, and SDKs for anyone to see. Becoming an Android developer is quite easy—one just needs to pay a US$25 registration fee and he/she…

Read More

ZeuS Targets Mobile Users

  • Posted on:March 4, 2011 at 1:49 am
  • Posted in:Malware, Mobile
  • Author:
    Patrick Estavillo (Threats Analyst)
21

As early as 2006, Trend Micro already recognized the fact that the BlackBerry technology could be exploited by cybercriminals. The smartphone may have remained spared from malware attacks over the years although there have been recent news of a ZeuS variant specifically targeting BlackBerry users. As we have said in a recent post, banking Trojans…

Read More

Best Practices Can Prevent Manifold Malware Infection

  • Posted on:March 2, 2011 at 10:26 pm
  • Posted in:Bad Sites
  • Author:
    Francis Saguiguit (Threats Analyst)
7

Very recently, one of our colleagues, Menard Oseña, who attended the “RSA Conference” discussed how important it is for organizations to have a strong security mindset when it comes to dealing with social media and company information. In the report, he highlighted how organizations should always make sure that they protect themselves from both internal and external…

Read More
Page 5 of 5 « ‹ 45

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.