• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Ben April (Threat Researcher)

Ben April

Threat Researcher

Flattening Bitcoin: What is Transaction Malleability?

  • Posted on:February 20, 2014
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
1

The past few weeks have not been good for Bitcoin. Mt. Gox shut down withdrawals due to concerns over transaction malleability. The same flaw was reportedly used to loot more than 4,000 BTC (worth more than 2.7 million US dollars) from Silk Road 2.0 Deep Web marketplace. These stories, together with others that have shaken…

Read More
Tags: bitcoinDeep Websilk roadtransaction malleability

A Free Solution For DDoS Reflection Attacks: A Decade In Waiting

  • Posted on:January 21, 2014
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
1

At the risk of sounding repetitious, there is yet another basic internet protocol that is seeing increased use in distributed denial of service (DDoS) attacks. This time it is NTP, or the Network Time Protocol. It’s not nearly as well known as DNS or HTTP, but just as important. NTP is used to synchronize the…

Read More
Tags: BCP-38DDoSNTPreflection attack

Do You Hear What I Hear?

  • Posted on:December 19, 2013
  • Posted in:Malware
  • Posted by:
    Ben April (Threat Researcher)
0

This article, recently published in the Journal of Communications, adds another log to the BadBIOS fire. It has been stated that devices in the BadBIOS case are communicating across an air-gap with commodity PC audio hardware. This paper clearly spells out one workable way to communicate in this way. Even if this doesn’t end up…

Read More
Tags: air gapaudio hardwareBadBIOSdata exfiltrationMalware

Are The Days Of Unencrypted HTTP Numbered?

  • Posted on:November 20, 2013
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
0

Throughout all of 2013, there have been numerous revelations about how the NSA conducts mass surveillance on the Internet. These have sent the Internet Engineering community reeling. Protocols that have been in use for decades and based heavily on intrinsic trust have had that trust violated. This has caused the Internet standards community to take a…

Read More
Tags: DNSSECencryptionHTTP/2.0NSA

NYT/Twitter Hacks Show DNS Is Not Broken, But Domain Registrars Might Be

  • Posted on:August 28, 2013
  • Posted in:Social
  • Posted by:
    Ben April (Threat Researcher)
0

The recent attacks on New York Times, Twitter and others while DNS-related, were not the result of a weakness in the DNS at all. They resulted from weaknesses in domain registrar infrastructure. The DNS components related to this event performed exactly as they were designed and instructed to do. While it is true that the…

Read More
Tags: hackingNew York Timessyrian electronic armyTwitter
Page 1 of 512 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.