2011 was rife with both challenges and wins not only for Trend Micro but also for the rest of the security industry and our fellow cybercrimefighters in law enforcement. True to one of our predictions, 2011 has been dubbed the “Year of Data Breaches,” as we witnessed organizations worldwide succumb to targeted breach attacks and…
Read MoreBernadette Caraig
Technical Communications
Spammers have moved into new fields like social media (e.g., Facebook and Twitter). Like mass-mailing attacks, social media spam runs are triggered by the same motivation. Businesses that use social media can come across Web threats in the course of marketing and promotion. Social media spam may also cause system infections through employees who access social networking sites at work. Spam have come a…
Read MoreThe first half of 2011 was marred by a spate of data breaches, vulnerability exploit attacks, the proliferation of more and more Android malware, improved social networking scams, and notable developments in traditional system infections. As our security experts predicted, enterprises suffered from a slew of data breaches of never-before-seen magnitude. This spelled disaster not only for attack targets…
Read MoreCybercriminals have been found riding on Brittany Murphy’s sudden death to scare people into buying FAKEAV. Searching for keywords like “brittany murphy’s death” on Google resulted in at least two suspicious URLs: http://{BLOCKED}erracing.net/vwb.php?sell=brittany%20murphy%20death http://{BLOCKED}x.net/icd.php?go=brittany%20murphy%20death The spike in searches on Murphy’s death has become the theme for the latest blackhat search engine optimization (SEO) attack, which…
Read MoreTricking users into downloading rogue AV is an age-old cybercriminal tactic that still works. Hence the continuous rise in the number of rogue AV pushed to unwitting scam victims up to this day. In fact, the FBI just recently warned the public about the threat that rogue AV software poses, saying this has resulted in…
Read More