• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for December 2011

Adobe Zero-day Vulnerability Installs Backdoor – Another Targeted Attack?

  • Posted on:December 14, 2011 at 10:45 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Erika Mendoza (Threat Response Engineer)
6

When I read this blog entry a few days ago, the first question that entered my head was, “Is this another targeted attack?”. I took a look at the .PDF discussed in the entry and it appeared to be a document addressed to employees of a certain defense contractor. Trend Micro products detect this malicious…

Read More

Microsoft Releases 13 Bulletins to Close 2011

  • Posted on:December 13, 2011 at 8:55 pm
  • Posted in:Vulnerabilities
  • Author:
    Danielle Veluz (Technical Communications)
0

Microsoft released 13 bulletins today instead of 14, as announced in the Patch Tuesday announcement some days ago. In their final Patch Tuesday for the year, Microsoft addressed bugs in Windows, Internet Explorer, and Microsoft Office, while adding in a fix for DUQU in the bulletin MS11-087, which is also known as the DUQU zero-day…

Read More

12 for 2012: What Will The New Year Bring?

  • Posted on:December 12, 2011 at 5:15 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

As 2011 draws to a close, it’s time to look towards what will come next in order to help users and enterprises prepare for the challenges of the upcoming year. Broadly speaking, our predictions can be split into four categories: enterprise IT trends, the mobile market, data breaches, and the ever-evolving cybercriminal industry. Enterprise IT…

Read More

The Real Issues About Carrier IQ

  • Posted on:December 8, 2011 at 11:14 pm
  • Posted in:Mobile
  • Author:
    Kervin Alintanahin (Threats Analyst)
3

For the past week or so, the Internet has been buzzing over Carrier IQ – an application that is apparently preinstalled in devices to monitor network and handset performance – and the privacy issues surrounding it. There are several issues surrounding the reports about Carrier IQ, issues around the kind of information it gathers, the…

Read More

DNSCrypt – Not Fundamental Enough

  • Posted on:December 8, 2011 at 5:33 pm
  • Posted in:Bad Sites
  • Author:
    Ben April (Threat Researcher)
7

Earlier this week the folks over at OpenDNS announced a preview release of their new tool DNSCrypt. This is touted as a huge step forward for privacy and security across the Internet. The premise is simple, encrypt all DNS traffic between the user and their recursive resolver. It’s a nice idea and all, but I…

Read More
Page 3 of 4 « ‹ 234 ›

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.