• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   MySpace

What Happens When The Cloud Goes Away?

  • Posted on:July 23, 2013 at 1:28 pm
  • Posted in:Social
  • Author:
    Jonathan Leopando (Technical Communications)
1

As more and more users entrust parts of their digital lives to the cloud, they’re increasingly running into a problem: it doesn’t always last forever. More specifically, cloud services that people have relied upon are just like any other business: they can close their doors. Just in the past few weeks, here are some cloud…

Read More
Tags: cloud computingcloud servicesdata protectionGoogle ReaderMySpacesecuritySnapReader

MySpace Pages Rigged with Bad Script

  • Posted on:September 18, 2008 at 11:02 pm
  • Posted in:Malware
  • Author:
    JM Hipolito (Technical Communications)
1

Trend Micro was recently alerted to a possible malware detection triggered when visiting MySpace Web pages. According to reports, certain MySpace pages are being detected as Possible_HiFrm. Possible_HiFrm is a heuristic detection noted for being effective in detecting malicious iframes and redirects pointing to most of the old and some of the recent Web threats….

Read More
Tags: MySpace

Phishers Drop MySpace Bait

  • Posted on:June 9, 2008 at 12:45 am
  • Posted in:Bad Sites
  • Author:
    Christopher Talampas (Fraud Analyst)
0

TrendLabs Content Security has come upon a new phishing attack that leads to the download of malware. However, unlike most instances where phishing baits are usually banks, credit unions or other financial institutions, this time it uses the popular social networking Web site MySpace.com. The phishing URL may be contained in spammed email messages. Once…

Read More
Tags: fakeMobileMySpacesocial networking site

Scammers Dive in to LinkedIn

  • Posted on:June 5, 2008 at 6:30 am
  • Posted in:Bad Sites
  • Author:
    Arman Capili (Technical Communications)
1

Scam artists have recently taken center stage on LinkedIn, a social networking site for professionals. Reports indicate that scammers have eyed the lucrative membership base of LinkedIn since these miscreants are fully aware that they are no longer dealing with mere teenagers but grown-ups with money. The scam techniques are notably old and well-known as…

Read More
Tags: 419 scamFacebookfake accountLinkedInMSNMySpacePerfspotscamsocial networking site

Yahoo! Jukebox Plays Malware Instead of Hits

  • Posted on:February 6, 2008 at 1:58 pm
  • Posted in:Vulnerabilities
  • Author:
    Dianne Lagrimas (Technical Communications)
0

Yahoo! Music Jukebox may dish out malware instead of hits, after the discovery of exploits made for ActiveX vulnerabilities in the media player. The Register identifies Elazar Broad as the researcher discovering the targeted vulnerabilities: two unpatched ActiveX flaws which, when successfully exploited, cause a buffer overflow that may allow an attacker to run malicious…

Read More
Tags: ActiveXElazar BroadExploitsFacebooklianzongMySpaceVulnerabilitiesYahoo! Music Jukebox

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.