• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   encryption

Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations

  • Posted on:May 3, 2016 at 5:00 am
  • Posted in:Deep Web
  • Author:
    Trend Micro
0

To answer the question we posed before: Yes, cybercriminals and terrorists are more similar than we think – they use similar platforms and services online, but also with some key differences.

Read More
Tags: cybercriminalsDeep Webencryptionterrorismterrorist organizationsterrorist technologiesunderground

Dark Motives Online: Are Cybercriminals and Terrorist Organizations More Similar than We Think?

  • Posted on:May 2, 2016 at 6:25 am
  • Posted in:Deep Web
  • Author:
    Trend Micro
0

Are terrorists really any different from cybercriminals? We stumbled upon terrorist content during our investigations on cybercriminal activity in the underground, and after a thorough analysis of it, we uncovered parallels in the way these two distinct groups operate online.

Terrorists’ usage of the Internet in their operations has been under heavy discussions as of late, with recent events such as the Paris and Belgium attacks bringing the controversial subject to the forefront. When terrorist groups make use of the latest cyber technologies, techniques, and applications spanning across mobile, surface web, as well as deep and dark web, it makes the problem of tracking them even that much harder.

Read More
Tags: cybercrimeencryptionterrorismterrorist technologies

SLOTH Downgrades TLS 1.2 Encrypted Channels

  • Posted on:February 1, 2016 at 11:41 am
  • Posted in:Vulnerabilities
  • Author:
    William Gamazo Sanchez (Vulnerability Research)
0

Early last month a new vulnerability was found in how TLS 1.2 was implemented.  Researchers from the French Institute for Research in Computer Science and Automation (INRIA) called this new attack SLOTH (Security Losses from Obsolete and Truncated Transcript Hashes). An attacker with man-in-the-middle capabilities could use SLOTH to attack encrypted traffic in the following ways: decrypt…

Read More
Tags: encryptionSLOTHTLS

CTO Insights: Encryption Works – Don’t Break It!

  • Posted on:December 1, 2015 at 12:00 am
  • Posted in:Social
  • Author:Raimund Genes (Chief Technology Officer)
1

Every now and then, an ill-informed politician will stand before a microphone and say something along the lines of: encryption is helping bad guys (either terrorists, child pornographers, or other similarly acceptable target), because law enforcement can’t see what the bad guys are doing because they’re using sophisticated tools that use encryption. Said politician will urge tech companies to “work with us” to help catch these bad guys.

Read More
Tags: cryptographyencryptionprivacyterrorism

How Exploit Kit Operators are Misusing Diffie-Hellman Key Exchange

  • Posted on:September 21, 2015 at 5:48 pm
  • Posted in:Exploits, Malware
  • Author:
    Trend Micro
1

By Brooks Li, Stanley Liu and Allen Wu Feedback from the Trend Micro™ Smart Protection Network™ has allowed us to discover that the notorious Angler and Nuclear exploit kits have included the latest Flash vulnerability (CVE-2015-5560) in their regular update. This means that systems with Adobe Flash Player 18.0.0.209 and earlier are vulnerable; however users running the…

Read More
Tags: diffie-hellmanencryptionexploit kitsman in the middle
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.