• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for April 2013

World Backup Day: The 3-2-1 Rule

  • Posted on:April 2, 2013 at 6:03 am
  • Posted in:Bad Sites
  • Author:
    Jonathan Leopando (Technical Communications)
0

March 31 was something of a… busy day on the calendar, so some people may not have noticed that it was also World Backup Day. It’s as good a day as any to remind people about how important it is to back up your data. People today are generating more and more data. As our…

Read More
Tags: backupWorld Backup Day

Three Lessons from the South Korea MBR Wiper Attacks

  • Posted on:April 2, 2013 at 2:00 am
  • Posted in:Targeted Attacks
  • Author:Christopher Budd (Global Threat Communications)
1

Last week, we posted some detailed information about the actions that the March 20, 2013 MBR wiper attacks took against systems in South Korea. Today, I’d like to take that and some additional information that has come out about the incident and draw some conclusions about what lessons this attack teaches us. When we look…

Read More
Tags: MBR wiper attackstargeted attacks

Certain German Websites Defaced on April Fools’ Day

  • Posted on:April 1, 2013 at 10:42 pm
  • Posted in:Targeted Attacks
  • Author:
    Trend Micro
0

Certain German websites were defaced by a group of hackers on April Fools day. However, this act was no ordinary prank. The hackers left messages on the defaced German websites in Arabic, and the message is quite clear: Figure 1. Screenshot of defaced German website Translated, the text reads as: Algeria to the core #…

Read More
Tags: Africaalgeria to the coreFranceGermanyhackerIsraelUS
Page 6 of 6 « ‹ 56

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.