• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for June 2013

How PC Threats Go Mobile

  • Posted on:June 28, 2013 at 11:14 am
  • Posted in:Mobile
  • Author:
    Abigail Pichel (Technical Communications)
0

The discovery (and subsequent media coverage) of the mobile malware OBAD shows that mobile threats continue to be a serious concern for users.  Just like Windows malware, mobile malware are also becoming more sophisticated, both in technique and deployment. This confirms one of our 2013 security predictions. OBAD exploits an Android vulnerability to avoid detection and uninstallation….

Read More
Tags: androidmalicious appsMobilemobile security

Spyware Hides Behind Stolen Opera Digital Certificate

  • Posted on:June 27, 2013 at 6:18 pm
  • Posted in:Malware
  • Author:
    Alvin Bacani (Research Engineer)
0

Opera recently disclosed that attackers compromised their network and stole at least one expired Opera code signing certificate. The attackers then used this certificate to sign their malware, which tricked the target system and (even) security software into thinking that the file was legitimate. We obtained a sample of the said malware (which is detected…

Read More
Tags: detectionhackMalwareOperastolen certificatetrend micro

South Korean Government DNS Servers Targeted By DDoS Attacks

  • Posted on:June 26, 2013 at 10:40 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Marco Dela Vega (Threats Researcher)
0

Our investigation of the June 25 South Korea incident led us to the compromise of an auto-update mechanism attack scenario. As part of our continuous monitoring, we documented another scenario (presented in this blog entry) pertaining to a DDoS attack scenario launched at specific sites. The recent attack against South Korean websites has revealed a…

Read More
Tags: DDoShackingnorth koreaSouth Korea

Compromised Auto-Update Mechanism Affects South Korean Users

  • Posted on:June 25, 2013 at 9:37 am
  • Posted in:Targeted Attacks
  • Author:
    Marco Dela Vega (Threats Researcher)
0

On Tuesday, South Korea raised the country’s cyber security alarm from level 1 to 3, because of several incidents that affected different government and news websites in South Korea. One of the several attacks related to the June 25 security incident involved the compromise of the auto-update mechanism related to the legitimate installer file SimDisk.exe,…

Read More
Tags: DDoShacktivismMalwareSimDiskSouth KoreaTargeted Attackweb site compromise

Scam Sites Now Selling Instagram Followers

  • Posted on:June 25, 2013 at 2:50 am
  • Posted in:Bad Sites, Social
  • Author:
    Karla Agregado (Fraud Analyst)
0

Another scam site is offering to increase a user’s Instagram followers. Unlike previous attacks, however, these sites require payment – with the amount depending on the number of followers you prefer. Figure 1. Pricelist for Instagram followers Despite the site’s liberal use of the Instagram logo, it has nothing to do with the service. It…

Read More
Tags: instagramscam sitessocial media
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.