• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for January 2016

Battling Business Email Compromise Fraud: How Do You Start?

  • Posted on:January 26, 2016 at 4:45 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Ryan Flores (Threat Research Manager)
0

In May 2014, an accountant to a Texas manufacturing firm received an email from a familiar correspondent, his company’s CEO. The email instructed him to wait for a call from a partner company and warned against sharing the email to anyone else for fear of regulation backlash. The company ended up losing US$ 480,000 to wire fraudsters who used the potent and very costly business email compromise (BEC) scam or CEO fraud. The firm is now suing its cyber insurer for not covering the loss.

Read More
Tags: BECbusiness email compromiseCEO fraudcorporate email scaminvoice fraud

Operation Emmental Revisited: Malicious Apps Lock Users Out

  • Posted on:January 21, 2016 at 7:50 pm
  • Posted in:Bad Sites, Mobile
  • Author:
    Richard Tai (Mobile Threat Analyst)
0

Imagine getting a notification from your bank, asking for your cooperation in installing an updated version of their mobile app. After downloading the app, it asks for administrator privileges. The notification you received said it would indeed prompt the question and so you allowed it. You try the app out and it works fine. You were…

Read More
Tags: androidfake appsOperation Emmental

Trend Micro Continues Protection for Older Versions of Internet Explorer

  • Posted on:January 19, 2016 at 8:00 am
  • Posted in:Vulnerabilities
  • Author:
    Pawan Kinger (Director, Deep Security Labs)
0

Last week, Microsoft ended support for older versions of Internet Explorer (versions 8, 9, and 10). This was done as part of the January 2016 Patch Tuesday cycle; at the same time support for Windows 8 also ended. This means that Microsoft will stop updating old versions of the browser and from now on (with some small exceptions) only systems with the latest IE version (Internet Explorer 11) will receive updates and patches. This poses risks to both end users and enterprises that fail to upgrade to new browser versions.

Read More
Tags: Deep Security and Vulnerability Protectionend of lifeInternet Explorer

A Case of Too Much Information: Ransomware Code Shared Publicly for “Educational Purposes”, Used Maliciously Anyway

  • Posted on:January 13, 2016 at 4:45 am
  • Posted in:Malware, Open source, Ransomware
  • Author:
    Trend Micro
0

Researchers, whether independent or from security vendors, have a responsibility to properly disseminate the information they gathered to help the industry as well as users. Even with the best intentions, improper disclosure of sensitive information can lead to complicated, and sometimes even troublesome scenarios.

Read More
Tags: BrazilHidden TearOpen sourceransomware

January Patch Tuesday: Support Ends for Windows 8, Limited for Older IE Versions; 17 Adobe Flaws Resolved

  • Posted on:January 12, 2016 at 2:09 pm
  • Posted in:Vulnerabilities
  • Author:
    Jonathan Leopando (Technical Communications)
0

The life cycle of Windows 8, the first operating system Microsoft intended for both desktop and mobile use, has ended. After this January 2016 Patch Tuesday release, users who have not yet updated/upgraded to Windows 8.1 (which was made available in late 2013) or Windows 10 will stop receiving updates. Updating to Windows 8.1 or 10 is currently free for Windows 8 users. This particular end of support should not be a surprise: once a service pack (in this case, Windows 8.1) is released, users have approximately 24 months to upgrade before support ends.

Read More
Tags: AdobeInternet ExplorerjanuaryMicrosoftPatch TuesdayWindows 8
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.