Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    June 2015
    S M T W T F S
    « May    
     123456
    78910111213
    14151617181920
    21222324252627
    282930  
  • Email Subscription

  • About Us


    Archive for the ‘Malware’ Category



    May19
    9:10 am (UTC-7)   |    by

    For the past couple of days the security industry has been discussing claims that the systems of a commercial aircraft was "hacked" via the on-board inflight entertainment system (IFE). This became public after a search warrant was obtained by media outlets which revealed that the Federal Bureau of Investigation had applied for a search warrant targeting Chris Roberts, a researcher looking into airplane security. The warrant alleged that Roberts could "hack" the IFE systems of various commercial planes and issued ...

    Posted in Malware |



    Best practices are failing. No matter how good you are at sticking to them, they can no longer guarantee your safety against the simplest threats we saw last quarter. Malicious advertisements are in the sites you frequent, data-leaking apps come preinstalled in your gadgets, and data-encrypting malware run silently in your office networks. Even the macro threats that were supposedly long gone are now back in the wild. Today’s threats leave zero room for error. For instance, we saw a surge ...

    Posted in Malware |



    In our earlier post discussing steganography, I discussed how it is now being used to hide configuration data by malware attackers. Let's go discuss this subject another facet of this topic in this post: how actual malware code is hidden in similar ways. Security analysts will probably throw their hands up in the air and say, "we've had code hiding within code for years now, that's not steganography!". That's not what I'm talking about. I will talk about how steganography is used with seemingly innocuous data files ...

    Posted in Malware |



    In the first part of this series, we discussed about the macro malware we have recently seen in the threat landscape. This second entry will delve deeper into the techniques or routines of macro malware. Unintended consequences Let us put things into perspective – by itself, macros are not harmful to the user. Its intended function is to automate frequently used tasks. The problem lies when cybercriminals abuse the functionalities of macro code to execute malicious routines. Microsoft offers macro protection  within the Microsoft ...

    Posted in Malware |



    Threats that can evade detection are among the most dangerous kind we’re facing today. We see these characteristics in the most challenging security issues like targeted attacks and zero-day exploits. Being able to stay hidden can determine the success of an attack, making it something that attackers continuously want to achieve. In this series of blog posts, we will take a look at one of the techniques used by cybercriminals to evade detection and analysis. The Greek word steganos means hidden, and malware loves to ...

    Posted in Malware, Mobile |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice