• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   vulnerability

Wake up and Smell the Coffee

  • Posted on:June 19, 2008 at 12:19 am
  • Posted in:Vulnerabilities
  • Author:
    Macky Cruz (Technical Communications)
0

Like something right out of the Jetsons Family’s array of labor-saving devices, the Jura F90 Bean to Cup Coffee Machine, a real-world appliance that goes for $2,000 on Amazon, comes with a touchscreen panel, from where drinkers can specify the volume, strength and temperature of their coffee. However, the Pandora’s box in the deal is…

Read More
Tags: coffeemakershackingoff-the-shelf malwarevulnerabilityvulnerable devices

Microsoft Alerts Users to Carpet Bombing via Safari

  • Posted on:June 2, 2008 at 5:51 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Jake Soriano (Technical Communications)
1

Nitesh Dhanjani has disclosed around middle of last month a vulnerability in Safari (and the way it interacts with Windows and OSX) that allows a remote malicious user to download several files unknowingly to the user’s default download folder (Desktop for Windows and Downloads for OSX). The attack has been dubbed carpet bombing because of…

Read More
Tags: Applebugscarpet bombingMicrosoftOS Xsafarivulnerability

Zero-Day Exploits Target Microsoft Jet Flaw

  • Posted on:March 27, 2008 at 1:45 pm
  • Posted in:Malware, Vulnerabilities
  • Author:
    JM Hipolito (Technical Communications)
2

Investigations are currently being conducted as reports of targeted attacks through an unpatched security flaw in Microsoft’s Jet Database Engine has surfaced. This vulnerability is exploited through a specially crafted Microsoft Word document detected by Trend Micro as TROJ_EMBED.AA. The Word file launches a Microsoft Database (MDB) file detected as TROJ_MSJET.C, which serves as a…

Read More
Tags: MS JET database enginevulnerability

Olympic Fans May Fall for Unpatched MS Excel Vuln

  • Posted on:March 9, 2008 at 9:50 pm
  • Posted in:Exploits
  • Author:
    Joseph Cepe (Threats Analyst)
2

XLS files specially designed to exploit a currently unpatched vulnerability in Microsoft Excel (identified as CVE-2008-0081) are reportedly being sent as email attachments in the wild. The attachments, which arrive either as OLYMPIC.XLS or SCHEDULE.XLS are capable of dropping and executing Windows binary executables. This Trojan also drops a non-malicious Excel file and opens it…

Read More
Tags: CTO InsightsExploitsfansMS Excelvulnerability
Page 23 of 23 « ‹ 2223

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.