• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for December 2014

App “Component” Downloads Apps Onto Devices

  • Posted on:December 22, 2014 at 9:28 am
  • Posted in:Malware, Mobile
  • Author:
    Kenny Ye (Mobile Threat Response Engineer)
0

We often talk about the security risks when dealing with third-party app stores. Previous research has shown that third-party app stores are often a hotbed of malware, specifically, malicious versions of popular apps. Aside from malicious apps, we are now seeing a marked increase of “downloader apps” in these stores, whose primary function is to…

Read More
Tags: androiddownloadMalwareMobilethird-party app site

How Cybercriminals Dodge Email Authentication

  • Posted on:December 18, 2014 at 7:40 pm
  • Posted in:Spam
  • Author:
    Marshall Chen (Threats Analyst)
0

Email authentication and validation is one method that is used to help bring down the levels of spam and phishing by identifying senders so that malicious emails can be identified and discarded. Two frameworks are in common usage today; these are SPF and DKIM. SPF (Sender Policy Framework): Defined in RFC 7208, SPF provides a…

Read More
Tags: DKIMDMARCemail authenticationSpamSPF

Doubts Raised About “Grinch” Linux Vulnerability

  • Posted on:December 18, 2014 at 9:35 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
0

Security researchers have announced a new “vulnerability” in Linux dubbed “Grinch“, which allows for escalation-of-privilege attacks in versions of Linux that use the polkit toolkit for privilege authorization. However, the true threat of this vulnerability is much more limited. The bug was named after the holiday season and the Dr. Seuss character, as some would say that…

Read More
Tags: GrinchLinuxvulnerability

What’s New in Exploit Kits in 2014

  • Posted on:December 17, 2014 at 5:13 am
  • Posted in:Exploits
  • Author:
    Brooks Li (Threats Analyst)
0

Around this time in 2013, the most commonly used exploit kit – the Blackhole Exploit Kit – was shut down after its creator, Paunch, was arrested by law enforcement. Since then, a variety of exploit kits has emerged and have been used by cybercriminals. The emergence of so many replacements has also meant that there…

Read More
Tags: 2014exploit kits

Evaluating the Security of Cyber-Physical Systems: AIS (Paper and Source Code Now Available)

  • Posted on:December 16, 2014 at 8:32 am
  • Posted in:Targeted Attacks
  • Author:
    Marco Balduzzi (Senior Threat Researcher)
0

When I am in the United States I tend to overwork, especially up in the air as many planes today are WiFi-enabled. I just got back from New Orleans, a city with a vibrant atmosphere that I found musically and culturally rich. New Orleans was the venue of this year’s Annual Computer Security Applications Conference…

Read More
Tags: AISautomated identification systemmaritimevessels traffic monitoring
Page 2 of 5 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.