• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Sarah Calaunan (Fraud Analyst)

Sarah Calaunan

Fraud Analyst

Phishers Take Aim at Slingshot

  • Posted on:November 18, 2008
  • Posted in:Mobile
  • Posted by:
    Sarah Calaunan (Fraud Analyst)
1

The Trend Micro Content Security Team just discovered a phishing attack targeting Slingshot Communications, Inc. A phishing email pretends to update a customer’s existing account. It also includes the legitimate contact number of the company to make it seem authentic. Figure 1. Phishing email sent to users Figure 2. The Slingshot phishing site Slingshot Communications,…

Read More
Tags: Slingshot

Yahoo! Marketing Gets Phished

  • Posted on:October 13, 2008
  • Posted in:Mobile
  • Posted by:
    Sarah Calaunan (Fraud Analyst)
2

Advertisers beware! Trend Micro researchers recently discovered a phishing attack that targets Yahoo! Search Marketing users. A phishing email that pretends to help update the recipient’s account is spammed to users, hoping to convince them into giving out account credentials. Screenshots below: Figure 1: Spammed phishing email containing link to phishing page Figure 2: Phishing…

Read More
Tags: malvertisingSEOYahoo! Search Marketing

Flying Phish

  • Posted on:September 25, 2008
  • Posted in:Mobile
  • Posted by:
    Sarah Calaunan (Fraud Analyst)
0

Do you want to go to US for a vacation? For the obvious convenience, most travelers already buy airline tickets online. Beware, though, because as Advanced Threat Researcher Paul Ferguson has discovered the following American Airlines phish it seems a unique profit opportunity for malware writers is emerging: Figure 1. American Airlines phishing page The…

Read More
Tags: AAdvantageAmerican AirlinesMobile

Phish in the (Photo)bucket

  • Posted on:August 19, 2008
  • Posted in:Mobile
  • Posted by:
    Sarah Calaunan (Fraud Analyst)
0

Photobucket is, by far, one of the largest photo-sharing sites in the world. It is generally used for personal photographic albums, remote storage of avatars displayed on Internet forums, and storage of videos. Lots of people may opt to keep their albums private, allow password-protected guest access, or open them up to the public. And…

Read More
Tags: Flickrimage-hosting sitesImageshackMobilephoto-sharingPhotobucket
Page 2 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.