• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Ben April (Threat Researcher)

Ben April

Threat Researcher

What’s in Your Packets?

  • Posted on:November 1, 2010
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
9

At least two tools have been released in the past week that make stealing Facebook, Twitter, or just about any other Web 2.0 account while you surf from your local coffee shop a drag-and-drop proposition. From a technical standpoint, it has never been difficult to do. With these new tools, however, it becomes trivial. I’im…

Read More

The Security Effects of Internationalized Domain Names

  • Posted on:October 5, 2010
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
17

Over the years, many changes have been made to the Domain Name System (DNS). Some of these changes were made to allow internationalized domain names (IDNs). The concept behind these is simple—to allow language-specific scripts or characters that are not part of the usual Latin alphabet to become part of domain names. However, the security…

Read More

Protecting Your Router Against Possible DNS Rebinding Attacks

  • Posted on:August 3, 2010
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
2

Last week at the BlackHat and DEFCON security conferences, independent researcher Craig Heffner demonstrated a new attack against home routers that combined DNS rebinding and Cross-Site Request Forgery (CSRF). This attack used JavaScript to trick the user’s browser into establishing a communication channel between the attacker and the admin console of his/her home router. If…

Read More

The Ticking Time Bomb of IPv6 Migration

  • Posted on:July 19, 2010
  • Posted in:Bad Sites
  • Posted by:
    Ben April (Threat Researcher)
0

Over the past few years, there has been plenty of talk about the exhaustion of IPv4 addresses and the need to adopt IPv6. One thing that is clear is that we will run out of space within 1–2 years, if not sooner. How IPv4 addresses will run out We know how IPv4 addresses will be…

Read More

Can IDN Usage Open a Can of Unicode Worms?

  • Posted on:January 4, 2010
  • Posted in:Mobile
  • Posted by:
    Ben April (Threat Researcher)
7

I recently made up two nonsensical domain names—eixpay.com and eixpay.com—can you spot the difference between them? In a modern Unicode-capable browser, they are likely to appear identical but if you copy and paste each one into a search engine, you will get different results. The domain on the right was created using Cyrillic characters while…

Read More
Page 4 of 5 « ‹ 345 ›

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.