• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Det Caraig (Technical Communications)

Bernadette Caraig

Technical Communications

2011: The Year of Data Breaches

  • Posted on:January 17, 2012
  • Posted in:Bad Sites, Botnets, Exploits, Malware, Spam, Targeted Attacks, Vulnerabilities
  • Posted by:
    Det Caraig (Technical Communications)
3

2011 was rife with both challenges and wins not only for Trend Micro but also for the rest of the security industry and our fellow cybercrimefighters in law enforcement. True to one of our predictions, 2011 has been dubbed the “Year of Data Breaches,” as we witnessed organizations worldwide succumb to targeted breach attacks and…

Read More

What Has Become of Spam?

  • Posted on:October 2, 2011
  • Posted in:Bad Sites
  • Posted by:
    Det Caraig (Technical Communications)
1

Spammers have moved into new fields like social media (e.g., Facebook and Twitter). Like mass-mailing attacks, social media spam runs are triggered by the same motivation. Businesses that use social media can come across Web threats in the course of marketing and promotion. Social media spam may also cause system infections through employees who access social networking sites at work. Spam have come a…

Read More

Counting Down to Another Half-Year of Threats

  • Posted on:August 3, 2011
  • Posted in:Bad Sites
  • Posted by:
    Det Caraig (Technical Communications)
3

The first half of 2011 was marred by a spate of data breaches, vulnerability exploit attacks, the proliferation of more and more Android malware, improved social networking scams, and notable developments in traditional system infections. As our security experts predicted, enterprises suffered from a slew of data breaches of never-before-seen magnitude. This spelled disaster not only for attack targets…

Read More

News on Brittany Murphy’s Death Lead to FAKEAV

  • Posted on:December 21, 2009
  • Posted in:Bad Sites, Malware
  • Posted by:
    Det Caraig (Technical Communications)
3

Cybercriminals have been found riding on Brittany Murphy’s sudden death to scare people into buying FAKEAV. Searching for keywords like “brittany murphy’s death” on Google resulted in at least two suspicious URLs: http://{BLOCKED}erracing.net/vwb.php?sell=brittany%20murphy%20death http://{BLOCKED}x.net/icd.php?go=brittany%20murphy%20death The spike in searches on Murphy’s death has become the theme for the latest blackhat search engine optimization (SEO) attack, which…

Read More

Rogue AV Scams Result in US$150M in Losses

  • Posted on:December 21, 2009
  • Posted in:Malware
  • Posted by:
    Det Caraig (Technical Communications)
3

Tricking users into downloading rogue AV is an age-old cybercriminal tactic that still works. Hence the continuous rise in the number of rogue AV pushed to unwitting scam victims up to this day. In fact, the FBI just recently warned the public about the threat that rogue AV software poses, saying this has resulted in…

Read More
Page 1 of 612 › »

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.