• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for March 2014

Managing Windows XP’s Risks in a Post-Support World

  • Posted on:March 31, 2014 at 12:59 pm
  • Posted in:Vulnerabilities
  • Author:
    Pawan Kinger (Director, Deep Security Labs)
0

There are now less than two weeks left until Microsoft terminates support for the incredibly long-lived Windows XP. Rarely has a tech product lasted as long as XP has – from XP’s launch on  October 25, 2001 to its last Patch Tuesday on April 8, 2014 a total of 12 years, 5 months, and two…

Read More
Tags: end of supportMicrosoftVulnerabilitiesWindowsWindows XP

A Look at the GnuTLS X.509 Verification Code Flaw

  • Posted on:March 31, 2014 at 10:22 am
  • Posted in:Vulnerabilities
  • Author:
    Virendra Bisht (Vulnerability Researcher)
0

GnuTLS is a secure communications library implementing the SSL, TLS, and DTLS protocols. It provides applications a way to use the above protocols without having to create their own cryptographic code. It is aimed to be portable and efficient with a focus on security and interoperability. In many cases, it is used instead of other libraries because…

Read More
Tags: certificatesGnuTLSVulnerabilities

Word and Excel Files Infected Using Windows PowerShell

  • Posted on:March 27, 2014 at 1:16 pm
  • Posted in:Malware
  • Author:
    Alvin John Nieto (Threat Response Engineer)
11

Malware targeting Word and Excel files has been around for some time, but we recently encountered a new malware family, CRIGENT (also known as “Power Worm”) which brings several new techniques to the table. (We detect these files as W97M_CRIGENT.A and X97M_CRIGENT.A.) Most significantly, instead of creating or including executable code, CRIGENT uses the Windows PowerShell…

Read More
Tags: CRIGENTMalwareMicrosoft ExcelMicrosoft WordPowershell

Mobile Malware and High Risk Apps Reach 2M Mark, Go for “Firsts”

  • Posted on:March 26, 2014 at 12:41 pm
  • Posted in:Malware, Mobile
  • Author:
    Abigail Pichel (Technical Communications)
0

Just six months after mobile malware and high risk apps reached the one million mark, we have learned that that number has now doubled. Figure 1. The number of malicious and high risk apps reaches the 2M mark This milestone comes at the heels of the “tenth anniversary” of mobile malware. 2004 saw the first…

Read More
Tags: androidAndroid malwareDogecoinMobileTor

Microsoft Word Zero-Day Spotted in the Wild

  • Posted on:March 25, 2014 at 3:57 pm
  • Posted in:Targeted Attacks, Vulnerabilities
  • Author:
    Abigail Pichel (Technical Communications)
2

Microsoft has released a security bulletin announcing of a zero-day vulnerability affecting Microsoft Word. Furthermore, the company states that there are “limited, targeted attacks directed at Microsoft Word 2010.” If exploited, this vulnerability (CVE-2014-1761) could allow a remote attacker to execute commands remotely via specially crafted files and email messages. Microsoft has also released preliminary…

Read More
Tags: MicrosoftMicrosoft WordVulnerabilitieszero-day vulnerability
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.