• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for February 2013

Cybercriminals Hop On the Google Project Glass Bandwagon

  • Posted on:February 28, 2013 at 3:33 pm
  • Posted in:Bad Sites, Social
  • Author:
    Ruby Santos (Fraud Analyst)
0

Cybercriminals tend to leverage what’s popular and new. Case in point, the much-anticipated Google Project Glass is being used as a social engineering lure to trick unsuspecting users into scams. We found that one of the top results for the search term “free Google glasses” is an eye-catching YouTube link with the title [{FREE}] Google Project…

Read More
Tags: Google glass projectsurvey scams

Modified Ichitaro .DLL File Leads to Backdoor

  • Posted on:February 27, 2013 at 9:15 pm
  • Posted in:Malware
  • Author:
    Roddell Santos (Threats Analyst)
0

The popular Japanese word processor software Ichitaro is no stranger to threats, particularly exploits taking advantage of the software’s vulnerabilities. Since 2007, we have reported the malware targeting Ichitaro’s security flaws. This time, however, we uncovered an attack that employs an old trick that even Microsoft Office was previously vulnerable to (CVE-2011-1980). Typically, when an…

Read More

BKDR_RARSTONE: New RAT to Watch Out For

  • Posted on:February 27, 2013 at 1:44 pm
  • Posted in:Malware, Targeted Attacks
  • Author:
    Abraham Camba (Threat Researcher)
1

Last year, we reported about PlugX a breed of Remote Access Trojan (RAT) used in certain high-profile APT campaigns. We also noted some of its noteworthy techniques, which include its capability to hide its malicious codes by decrypting and loading a backdoor “executable file” directly into memory, without the need to drop the actual “executable…

Read More

PostgreSQL Denial of Service Vulnerability Found and Patched

  • Posted on:February 27, 2013 at 2:09 am
  • Posted in:Vulnerabilities
  • Author:
    Sumit Soni (Vulnerability Research)
0

PostgreSQL is a fully featured object-relational database management system. It supports a large part of the SQL standard and is designed to be extensible by users in many aspects.  Graphical user interfaces and bindings for many programming languages are available as well. Earlier this month, I discovered a denial of service vulnerability in versions of PostgreSQL that caused a…

Read More

Your Data and the Business of Online Scams

  • Posted on:February 26, 2013 at 1:57 pm
  • Posted in:Bad Sites
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

Just like other businessmen, scammers operate using certain business models. In my previous post, I wrote about the typical scammer, their trust model, and the strategies they use to get, hold, and sustain customers. In this post, we’ll look at their business model, and how users can avoid their schemes. Scammers Business Model While scammers…

Read More
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.