• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for December 3, 2012

Taidoor Update: Taidoor Gang Tags Its Victims

  • Posted on:December 3, 2012 at 1:58 pm
  • Posted in:Malware, Targeted Attacks
  • Author:
    Jessa De La Torre (Senior Threat Researcher)
0

We’ve been seeing an increase in Taidoor downloaders in the wild, but instead of embedding the backdoor in email attachments, the current trend in Taidoor-related attacks is to include an attachment with a Taidoor-downloading Trojan. Based on the sample set we gathered, it appears this type of technique has only been used this year. For…

Read More

Apps’ Battery Consumption Issue in Japan (Part 3)

  • Posted on:December 3, 2012 at 9:01 am
  • Posted in:Mobile
  • Author:
    Noriaki Hayashi (Senior Threat Researcher)
0

In this part 3 as the last entry, I will report the result of our investigation on app-related battery consumption issue and its reality. Android Apps’ Battery Consumption Issue According to Trend Micro research, almost 47% of smartphone users in Japan are bothered by their device’s battery longevity. Dubbed “PC on your palm” the smartphone’s…

Read More

Privacy Worries Hound Facebook Yet Again

  • Posted on:December 3, 2012 at 4:45 am
  • Posted in:Social
  • Author:
    Jonathan Leopando (Technical Communications)
0

Last week, many people made posts like this on Facebook: While this was quickly debunked as being entirely untrue, the fact that millions of people made the very same post speaks volumes about how worried people about their privacy on Facebook. It’s probably not helping that Facebook just finished soliciting comments on their new Data Use…

Read More

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.