• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for June 2014

Understanding the Internet of Everything

  • Posted on:June 30, 2014 at 12:43 pm
  • Posted in:Internet of Things, Social
  • Author:
    Bernadette Irinco (Technical Communications)
0

When people discuss the Internet of Everything (IoE), it refers to the introduction of computing power and networking capabilities to previously “dumb” devices like television sets, cars, pedometers, and appliances.Ā Many believe that it is the next big thing in tech, andĀ it offers users a wide array of benefits, allowing them to save time, money, or…

Read More
Tags: data theftGoogle GlassInternet of ThingsIoEprivacywearable technology

Endpoint Security: Evolving With The Threats They Mitigate

  • Posted on:June 30, 2014 at 7:03 am
  • Posted in:Exploits, Malware, Mobile
  • Author:
    Ryan Certeza (Technical Communications)
0

Evolution is a continuousĀ process, and nothing can exemplify the processĀ better in our industry than the threats we defend against. From simple pranks and nuisances, they’ve become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for the sake of money. They’ve also become tools for activists and terrorists of…

Read More
Tags: Malwaresecurity solutionstechnologythreat landscape

New Banking Malware Uses Network Sniffing for Data Theft

  • Posted on:June 27, 2014 at 8:47 am
  • Posted in:Malware, Spam
  • Author:
    Joie Salvio (Threat Response Engineer)
0

With online banking becoming routine for most users, it comes as no surprise that we are seeing more banking malware enter the threat landscape. In fact, 2013 saw almost a million new banking malware variants—double the volume of the previous year. The rise of banking malware continued into this year, with new malware and even…

Read More
Tags: EMOTETMalwareonline banking

PlugX RAT With ā€œTime Bombā€ Abuses Dropbox for Command-and-Control Settings

  • Posted on:June 25, 2014 at 6:05 am
  • Posted in:Targeted Attacks
  • Author:
    Maersk Menrige (Threats Analyst)
1

Monitoring network traffic is one of the meansĀ for IT administrators to determine if there is an ongoing targeted attack in the network. Ā Remote access tools or RATs, commonly seen in targeted attack campaigns, are employed to establish command-and-control (C&C) communications.Ā  Although the network traffic of these RATs, such as Gh0st, PoisonIvy, Hupigon, and PlugX, among…

Read More
Tags: lateral movementplugXtargeted attacksthreat intelligence

Cross-Platform Mobile Threats: A Multi-Pronged Attack

  • Posted on:June 24, 2014 at 8:28 am
  • Posted in:Malware, Mobile
  • Author:
    Ryan Certeza (Technical Communications)
0

Cross-platform threats can be dangerous, both at home and in the office. TheseĀ can ā€˜jump’ from one platform to another, or target all of them at the same time – potentially infecting a user’s entire network, or even a company’s network if left unchecked. The risk to critical data and system functionality, not to mention overall…

Read More
Tags: cross-platform mobile threatscross-platform threatsmalicious appsmobile malwaretrojans
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.