• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2011

[INFOGRAPHIC] A Snapshot of Android Threats

  • Posted on:August 22, 2011 at 8:41 am
  • Posted in:Malware, Mobile
  • Author:
    Paul Oliveria (Technical Communications)
7

In January this year, Trend Micro chairman and co-founder Steve Chang was quoted as saying that Android-based devices are less secure than those running on iOS. While his comment caused quite a stir back then, today’s threat landscape seems to agree. Since Steve’s statement, our researchers saw a whopping 1410 percent increase in the number…

Read More
Tags: androidinfographicMalware

DroidDreamLight Variant Pretends to Manage APK Files

  • Posted on:August 20, 2011 at 9:25 am
  • Posted in:Mobile
  • Author:
    Mark Balanza (Threats Analyst)
6

We recently found a new variant of DroidDreamLight in the Android Market. The app promotes itself as an app that helps users manage the .APK files on their device. The sample was downloaded 50–100 times before it was removed from the Android Market. The malware sample we found, which we now detect as ANDROIDOS_DORDRAE.M, was…

Read More

Mobile Phone Monitoring Service Found

  • Posted on:August 19, 2011 at 9:26 am
  • Posted in:Malware, Mobile
  • Author:
    Lion Gu (Senior Threat Researcher)
4

Trend Micro uncovered how cybercriminals may profit from NICKISPY variants. A Chinese website offers mobile phone monitoring tools and services to customers who are given access to the site’s backend to retrieve information. However, such services are not cheap and can cost from US$300–540. We’ve been reporting about several NICKISPY variants—Android malware that can monitor…

Read More

Free ‘Breaking Dawn Part 2’ Tickets Scam Spreads in Facebook

  • Posted on:August 18, 2011 at 12:26 pm
  • Posted in:Bad Sites, Social, Spam
  • Author:
    Christopher Talampas (Fraud Analyst)
0

The latest Facebook scam leverages Breaking Dawn Part 2 and leads to survey pages that steal personal data such as cell phone numbers and email addresses. Who wants free tickets to The Twilight Saga: Breaking Dawn Part 2? To most, specifically to cybercriminals, the real question is, “Who wouldn’t?” We have encountered several incidents of clickjacking on…

Read More

Blackhat 2011: Dangers of Embedded Web Servers

  • Posted on:August 18, 2011 at 3:06 am
  • Posted in:Malware
  • Author:
    Jhoevine Capicio (Threats Analyst)
0

Most devices like printers, scanners, and VoIP systems nowadays have embedded Web servers for easy administration. Unfortunately, many of these devices are mostly unprotected due to lapses in configuration. Some servers are not properly configured and can be accessed using the default user name and password or are left with no means of protection. What’s…

Read More
Page 2 of 5 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.