• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2011

Smartphones: The Next One-Click Billing Fraud Target

  • Posted on:August 30, 2011 at 2:34 am
  • Posted in:Mobile
  • Author:
    Noriaki Hayashi (Senior Threat Researcher)
1

One-click billing fraud, a scheme known for targeting PC users in Japan, now appears to target smartphone users as well. The scheme, as its name suggests, tricks a victim into registering and paying for a certain service after being falsely led to a specific website. Instances of successful attacks have been increasing in Japan since…

Read More

Hurricane Irene Scam Hits Facebook

  • Posted on:August 29, 2011 at 2:09 am
  • Posted in:Bad Sites
  • Author:
    Karla Agregado (Fraud Analyst)
13

Hurricane Irene surely turned New York City into the “city that never sleeps,” as it brought floodwaters, knocked out power for more than 4 million people, and was even responsible for at least 15 deaths in six states. What’s worse is that cybercriminals are taking advantage of the incident by spamming a fake video on…

Read More

Targeting the Source: FAKEAV Affiliate Networks

  • Posted on:August 26, 2011 at 8:02 am
  • Posted in:Malware
  • Author:
    Nart Villeneuve (Senior Threat Researcher)
2

The operators of malicious networks are continuously monetizing their activities by propagating rogue security software that use scare tactics to trick unsuspecting users into installing and purchasing fake antivirus software, aka FAKEAV. Although there has been a decline in the FAKEAV volume as a result of the increasing pressure on payment processors that handle credit card…

Read More

[INFOGRAPHIC] The Geography of Social Media Threats

  • Posted on:August 26, 2011 at 1:51 am
  • Posted in:Malware
  • Author:
    Bernadette Irinco (Technical Communications)
9

When talking about social media threats, the focus tends to be on the notorious KOOBFACE malware, which has recently turned a “new leaf” and now propagates via peer-to-peer (P2P) file sharing. However, KOOBFACE is not the only threat that hounds social media. These social networking sites also have features that can become threat vectors. A…

Read More

ZBOT Variant That Uses Domain-Generation Technique Spreads Through Facebook Lure

  • Posted on:August 23, 2011 at 12:56 am
  • Posted in:Malware, Spam
  • Author:
    Chloe Ordonia (Anti-spam Research Engineer)
5

Our team recently came across a spam run that leads to the download of a ZBOT variant that uses a domain-generation technique. The spam run involves messages that arrive in users’ inboxes as Facebook friend request notifications. The message bears a link that the users must click to approve the friend request. Clicking the said…

Read More
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.