• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for April 2014

Passwords: Not Going Away Anytime Soon

  • Posted on:April 30, 2014 at 2:10 pm
  • Posted in:Bad Sites
  • Author:
    David Sancho (Senior Threat Researcher)
0

For users who are not system administrators, the biggest impact of the Heartbleed vulnerability has been all the passwords that they have had to change. This, together with improvements in alternative authentication methods (like the fingerprint scanners now embedded in flagship smartphones), have caused some rather bold statements about passwords to be made. Passwords are out…

Read More
Tags: data managementpassword managementpasswords

The Challenge of Collaborating with Law Enforcement Agencies to Stop Cybercrime

  • Posted on:April 29, 2014 at 10:30 pm
  • Posted in:Malware
  • Author:
    Trend Micro
1

The promise of easy money remains the biggest motivation for cybercrime today. Cybercriminals thus make it their main objective to steal information that would lead them to the money, like online banking information. Once stolen, the information can be used to transfer funds illegally from victims’ accounts. In 2013, the total amount of money stolen…

Read More
Tags: cooperationcybercrimeJapanlaw enforcementNational Police Agency

Old Infostealer Resurfaces, Now Delivers Ransomware

  • Posted on:April 29, 2014 at 8:44 am
  • Posted in:Malware, Ransomware
  • Author:
    Paul Pajares (Fraud Analyst)
0

Sometime near the start of the year, we noticed that the old malware family TSPY_USTEAL resurfaced. This information stealing malware now includes new routines including malicious packers, obfuscation, and bundling ransomware. TSPY_USTEAL variants were seen in the wild as early as 2009, and is known to steal sensitive information like machine details and passwords stored…

Read More
Tags: MalwareransomwareTSPY_USTEAL

Season of Zero-Days: Multiple Vulnerabilities in Apache Struts

  • Posted on:April 28, 2014 at 11:28 pm
  • Posted in:Vulnerabilities
  • Author:
    Pavithra Hanchagaiah (Senior Security Researcher)
0

The recent Internet Explorer and Flash zero-days were not the only zero-day threats that hit recently. Last Friday, the Apache Struts group released an advisory (S2-021) detailing two vulnerabilities (CVE-2014-0112 and CVE-2014-0113), and potential mitigation steps until an official patch is issued. Apache Struts is a framework used to build and deploy Java-based web applications. In Apache…

Read More
Tags: apacheApache StrutsstrutsVulnerabilitieszero day

Adobe Releases Patch for Flash Zero-Day Vulnerability

  • Posted on:April 28, 2014 at 11:23 am
  • Posted in:Malware, Vulnerabilities
  • Author:
    Abigail Pichel (Technical Communications)
1

Adobe has released a security advisory regarding a zero-day vulnerability (CVE-2014-0515) found in the program Adobe Flash. According to the advisory, the updates pertain to “Adobe Flash Player 13.0.0.182 and earlier versions for Windows, Adobe Flash Player 13.0.0.201 and earlier versions for Macintosh and Adobe Flash Player 11.2.202.350 and earlier versions for Linux.” Adobe has also acknowledged that…

Read More
Tags: Adobeadobe flashCVE-2014-0515vulnerabilityzero day
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.