Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • FREAK Vulnerability Forces Weaker Encryption

    TrendLabs - Malware Blog
    Security researchers and news outlets are reporting about a newly discovered vulnerability believed to exist since the 90s. This vulnerability, dubbed as FREAK (Factoring RSA Export Keys), forces a secure connection to use weaker encryption—making it easy for cybercriminals to decrypt sensitive information. Vulnerable since the 1990s The flaw came about in the 1990s. Back […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFREAK Vulnerability Forces Weaker Encryption
  • PwnPOS: Old Undetected PoS Malware Still Causing Havoc

    TrendLabs - Malware Blog
    We have been observing a new malware that infects point-of-sale (POS) systems. This malware may have been active since 2013, possibly earlier. Trend Micro will be naming this new malware family as PwnPOS to differentiate it from other known PoS malware families. In this blog post, we will discuss the technical details of this PoS […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPwnPOS: Old Undetected PoS Malware Still Causing Havoc
  • TorrentLocker Ransomware Uses Email Authentication to Refine Spam Runs

    TrendLabs - Malware Blog
    In monitoring the ransomware TorrentLocker, we noticed a new development in its arrival vector. In previous entries, we noted that a particular wave of the crypto-ransomware was using spammed messages that were designed to evade spam filters. Our research now shows that TorrentLocker malware are using emails that are designed to pass spam filters and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTorrentLocker Ransomware Uses Email Authentication to Refine Spam Runs
  • Extended Validation Certificates: Warning Against MITM Attacks

    TrendLabs - Malware Blog
    The recent Superfish incident has raised more concerns that SSL/TLS connections of users can be intercepted, inspected, and re-encrypted using a private root certificate installed on the user system. In effect, this is a man-in-the-middle (MITM) attack carried out within the user’s own system. We believe that site owners adopting extended validation (EV) certificates would help […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroExtended Validation Certificates: Warning Against MITM Attacks
  • 2014 Spam Landscape: UPATRE Trojan Still Top Malware Attached to Spam

    TrendLabs - Malware Blog
    The malware UPATRE was first spotted in August 2013 following the demise of the Blackhole Exploit kit. It was since known as one of the top malware seen attached to spammed messages and continues to be so all throughout 2014 with particularly high numbers seen in the fourth quarter of the year. We have released […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro2014 Spam Landscape: UPATRE Trojan Still Top Malware Attached to Spam
  • Arid Viper Update: Attacks Ongoing, Threat Actors on the Move

    TrendLabs - Malware Blog
    Last week, we released a research paper titled “Operation Arid Viper: Bypassing the Iron Dome” where we detailed two related campaigns. To recall, here are our key findings related to the two campaigns: Palestinian threat actors have staged a targeted attack, Operation Arid Viper, to exfiltrate data from high-profile targets in the Israeli government and have […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroArid Viper Update: Attacks Ongoing, Threat Actors on the Move
  • 2014 Annual Security Roundup: Magnified Losses, Amplified Need for Cyber-Attack Preparedness

    TrendLabs - Malware Blog
    2014 was a year where cybercriminal attacks crippled both likely and unlikely targets. A year rife with destructive attacks, 2014 proved to be a difficult one for individuals and companies who were victimized by these threats. Massive data breach disclosures came one after another in 2014 in much more rapid succession than past years. The […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro2014 Annual Security Roundup: Magnified Losses, Amplified Need for Cyber-Attack Preparedness
  • Notorious Malware Improvements and Enhancements of 2014

    TrendLabs - Malware Blog
    2014 was a year that was marked with numerous changes in the threat landscape. We saw a lot of improvements in existing malware, either with new evasion techniques or versions. We even saw some old techniques and attacks resurface in the landscape. Evasion Tactics We are seeing more malware incorporate Tor in their routines as […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNotorious Malware Improvements and Enhancements of 2014
  • Deploying a Smart Sandbox for Unknown Threats and Zero-Day Attacks

    TrendLabs - Malware Blog
    Zero-day exploits pose some of the most serious risks to users everywhere. The absence of a patch means that it is up to users (and whatever security products they use) to protect against these attacks. One of the tools that can be used in mitigating these attacks is advanced network detection solutions like Trend Micro Deep Discovery, […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDeploying a Smart Sandbox for Unknown Threats and Zero-Day Attacks
  • Protecting Your Money: How Does PoS Malware Get In?

    TrendLabs - Malware Blog
    2014 can be remembered as the year when PoS malware attacks became truly widespread. Many retailers and other businesses became victims of these attacks, which resulted in financial losses and embarrassment for their victims. One can ask: how do these organizations become victims of PoS malware in the first place? Most of the methods used […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroProtecting Your Money: How Does PoS Malware Get In?

Market Place