Top IT Security Bloggers

TrendLabs - Malware Blog
  • POWELIKS: Malware Hides In Windows Registry

    TrendLabs - Malware Blog
    We spotted a malware that hides all its malicious codes in the Windows Registry. The said tactic provides evasion and stealth mechanisms to the malware, which Trend Micro detects as TROJ_POWELIKS.A.  When executed, TROJ_POWELIKS.A downloads files, which can cause further system infection. Systems affected by this malware risk being infected by other malware, thus causing further […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPOWELIKS: Malware Hides In Windows Registry
  • The Severe Flaw Found in Certain File Locker Apps

    TrendLabs - Malware Blog
    Protecting data has always been one of the most important aspects of our digital life. Given the amount of activity done on smartphones, this is especially rings true for smartphones. While users may use the built-in privacy and security settings of their devices, others take it a step further and employ security and privacy protection […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Severe Flaw Found in Certain File Locker Apps
  • Gizmodo Brazil Compromised, Leads to Backdoor

    TrendLabs - Malware Blog
    Recently, I learnt that attackers compromised Gizmodo’s Brazilian regional site. The attackers were able to modify the Gizmodo main page to add a script which redirected them to another compromised website. This second compromised site was hosted in Sweden, and used a .se domain name. The attackers also uploaded a web shell onto this site (the site […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroGizmodo Brazil Compromised, Leads to Backdoor
  • New Crypto-Ransomware Emerge in the Wild

    TrendLabs - Malware Blog
    One of the recent triumphs against cybercrime is the disruption of the activities of the Gameover ZeuS botnet. Perhaps what makes this more significant is that one major threat was also affected—the notorious CryptoLocker malware. However, this disruption hasn’t deterred cybercriminals from using file-encrypting ransomware. In fact, we saw new crypto-ransomware variants that use new […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Crypto-Ransomware Emerge in the Wild
  • Vulnerabilities in Alipay Android App Fixed

    TrendLabs - Malware Blog
    Alipay is a popular third-party payment platform in China that is operated by Alibaba, one of the biggest Internet companies in China. We recently found two vulnerabilities in their Android app that could be exploited by an attacker to carry out phishing attacks to steal Alipay credentials.  Alipay acknowledged it and provided updates to their users […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroVulnerabilities in Alipay Android App Fixed
  • 22 Jump Street, Transformers Are Top Movie Lures for Summer

    TrendLabs - Malware Blog
    Summertime has become synonymous with blockbuster movies. Unfortunately, these movies have become a go-to social engineering lure used by cybercriminals. Just like in previous years, Trend Micro engineers searched for possible threats related to movies released during the summer. This year, 22 Jump Street was the top movie used for social engineering. Transformers: Age of […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro22 Jump Street, Transformers Are Top Movie Lures for Summer
  • Cybercrime Exposed Part 1: The Security Risks of Phishing

    TrendLabs - Malware Blog
    While new threats are emerging that hit new avenues or targets like PoS systems and cryptocurrencies, old threats like phishing remains to be an effective means of gathering user data. A simple spam email that leverages holidays, online shopping, release of anticipated gadgets, and hot/current news items can redirect unsuspecting users to survey scams and phishing pages that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCybercrime Exposed Part 1: The Security Risks of Phishing
  • Open Socket Poses Risks To Android Security Model

    TrendLabs - Malware Blog
    The security of the Android platform is based on its sandbox and permission protection mechanism, which isolates each app and restricts how processes can communicate with each other. However, because it is designed to be open to include other open source projects like Linux and OpenSSL, it can inherit many features as well as vulnerabilities. This means that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOpen Socket Poses Risks To Android Security Model
  • The Role of Smartphones in the Internet of Everything

    TrendLabs - Malware Blog
    Ever since the mobile boom, smartphones have become an integral part of our lives, enough that they’ve become virtually indispensable in today’s fast-paced world. Not only do they serve to connect us to our friends and loved ones wherever they may be, but they also allow us to do our daily tasks and chores all […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Role of Smartphones in the Internet of Everything
  • 1H 2014 Spam Attacks and Trends

    TrendLabs - Malware Blog
    In the first half of the year, the spam volume increased by 60% compared to the data last 1H 2013.  We can attribute these to several factors:  the prevalence of DOWNAD and the steady boom of malware-related emails with spam-sending capabilities (such as MYTOB). Prevalent threats like UPATRE and ZeuS/ZBOT also employed spam as its […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro1H 2014 Spam Attacks and Trends
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Risk Management Solutions

Protect resources and ensure security compliance through incident detection, response, and remediation.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.