• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Carolyn Guevarra (Technical Communications)

Carolyn Guevarra

Technical Communications

Is Free Antivirus Software Enough?

  • Posted on:October 30, 2013
  • Posted in:Malware
  • Posted by:
    Carolyn Guevarra (Technical Communications)
0

Traditional antivirus has always been every company’s first line of defense. They protect employees who still commit the usual mistakes that security experts tell everyone to avoid: opening malicious attachments, clicking unknown URLs, and visiting untrustworthy websites. In this context, these products may seem sufficient: they can identify bad files and known malware before they…

Read More
Tags: endpoint securityExploitsfree antivirusMalwarenetworksecuritysocial engineering

Months-Old Skype Vulnerability Exploited in the Wild

  • Posted on:June 16, 2010
  • Posted in:Malware, Vulnerabilities
  • Posted by:
    Carolyn Guevarra (Technical Communications)
5

Cybercriminals have once again used a not-so-new but still a seemingly promising medium for their malware campaigns. Earlier today, ZDNet reported a “new” exploit that targets Skype users. This exploit takes advantage of a vulnerability in a Skype component—EasyBits Extras Manager. While the vulnerability was found and fixed as early as October 2009, many users…

Read More

Microsoft Help Center Zero-Day Exploits Loose

  • Posted on:June 15, 2010
  • Posted in:Vulnerabilities
  • Posted by:
    Carolyn Guevarra (Technical Communications)
6

Heads-up for users still running Windows XP: The unpatched Help Center flaw revealed last week is now out in the wild and being used to launch malware attacks against target users. This new zero-day exploit takes advantage of the vulnerability that exists in the Microsoft Windows Help Center, a default Microsoft application that allows users…

Read More

Spoofed Trend Micro Alert Leads to Canadian Pharma Site

  • Posted on:June 11, 2010
  • Posted in:Malware, Spam
  • Posted by:
    Carolyn Guevarra (Technical Communications)
2

With the underground economy still thriving, cybercriminals will surely use any method such as Canadian pharma spam runs to facilitate their information theft operations. Canadian pharmacy sites are known to be used by scammers to sell a wide range of fake medicines usually for impotence and other serious medical conditions at much lower prices compared…

Read More

FIFA and Gaza Attack Tweets Dump Backdoors

  • Posted on:June 4, 2010
  • Posted in:Bad Sites, Malware, Spam
  • Posted by:
    Carolyn Guevarra (Technical Communications)
7

What do the “FIFA World Cup” and Gaza attack have in common? They are both currently being used as social engineering ploys by a couple of malware campaigns seen on Twitter. TrendLabsSM senior threat researcher Ivan Macalintal spotted several malicious programs being distributed via the popular microblogging site. These malware campaigns take advantage of noteworthy…

Read More
Page 1 of 1212 › »

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.