• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Douglas Otis (Senior Threat Researcher)

Douglas Otis

Senior Threat Researcher

Windows 8 and Windows RT: An Overview

  • Posted on:May 30, 2013
  • Posted in:Bad Sites
  • Posted by:
    Douglas Otis (Senior Threat Researcher)
0

Since its introduction in late 2012, Windows 8 has proven to be perhaps the most controversial version of Windows in recent memory. Much of the controversy is a direct result of its user interface, which represents a departure from the traditional desktop that’s been in use for many years. This debate has caused the other…

Read More
Tags: ASLRMicrosoftoperating systems securityUEFIWindows 8windows RT

Apple: A Thing Unto Itself Sans Java

  • Posted on:August 29, 2012
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Douglas Otis (Senior Threat Researcher)
0

Back in October of 2010, Apple announced they would drop support for Java. This did not spur Oracle to directly support this Unix platform as it did for other Unix operating systems. The delay this caused in Java updates allowed OS X to play a role in clickfraud schemes among other nefarious activities. Apple finally…

Read More
Tags: AppleJava

Possible Phishing with DKIM

  • Posted on:June 14, 2011
  • Posted in:Mobile
  • Posted by:
    Douglas Otis (Senior Threat Researcher)
10

In a recently concluded discussion by the Domain Keys Identified Mail (DKIM) Working Group, a group created under the Internet Engineering Tasks Force (IETF), some of those involved have decided to disregard phishing-related threats common in today’s effective social engineering attacks. Rather than validating DKIM’s input and not relying upon specialized handling of DKIM results,…

Read More

CARBERP Sinkholing Speculations

  • Posted on:May 22, 2011
  • Posted in:Bad Sites
  • Posted by:
    Douglas Otis (Senior Threat Researcher)
0

This report is related to the results of the sinkholing activity we conducted on a CARBERP communication-and-control (C&C) server. Our findings were initially published in this blog post. We contacted identifiable hosts that may have been affected by the CARBERP infections monitored by a particular C&C server. Beyond typical name/account information and perhaps information related with electronic…

Read More

CARBERP Sinkhole Findings

  • Posted on:May 19, 2011
  • Posted in:Bad Sites
  • Posted by:
    Douglas Otis (Senior Threat Researcher)
1

We were recently able to sinkhole a CARBERP command-and-control (C&C) server similar to the way by which we sinkholed a ZeuS C&C server in March this year. This post will explain our findings related to the said activity. The results basically led us to conclude that CARBERP has proven once more that malware creators are getting better at hiding…

Read More
Page 1 of 212

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • Cryptocurrency Web Miner Script Injected into AOL Advertising Platform

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.