Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • CoinVault Ransomware Jumps on Freemium Model

    TrendLabs - Malware Blog
    We have continuously monitored crypto-ransomware’s modifications and evolution since its discovery in late 2013. Though crypto-ransomware  is still relatively “new” to the threat landscape, it has already established itself as a formidable threat to unsuspecting users. By definition, crypto-ransomware shares similar routines with cryptolocker, a refinement of ransomware with file-encryption capabilities. We recently came across two variants […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCoinVault Ransomware Jumps on Freemium Model
  • Regin: Sophisticated Malware, But Not Without Precedent

    TrendLabs - Malware Blog
    Recent reports have implicated a sophisticated piece of malware known as Regin in targeted attacks in various countries. Regin was described as being highly sophisticated and designed to carry out long-term stealthy surveillance on would-be victims at the behest of its creators, who have been suggested to be nation-states. Telecommunication companies are believed to have […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRegin: Sophisticated Malware, But Not Without Precedent
  • Obfuscated Flash Files Make Their Mark in Exploit Kits

    TrendLabs - Malware Blog
    In recent years, we noticed that more and more malicious Adobe Flash (.SWF) files are being incorporated into exploit kits like the Magnitude Exploit Kit, the Angler Exploit Kit, and the Sweet Orange Exploit Kit. However, we did some more digging and found out that the number of Flash files isn’t the only thing that has […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroObfuscated Flash Files Make Their Mark in Exploit Kits
  • Hacking RFID Payment Cards Made Possible with Android App

    TrendLabs - Malware Blog
    We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the user’s RFID bus transit card to recharge the credits. What is the mechanism behind this, and what is the security risk of RFID payment cards in general? Paying via […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroHacking RFID Payment Cards Made Possible with Android App
  • The Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps

    TrendLabs - Malware Blog
    Based on our research into the iOS threat Masque Attacks announced last week, Trend Micro researchers have found a new way that malicious apps installed through successful Masque Attacks can pose a threat to iOS devices: by accessing unencrypted data used by legitimate apps. According to reports, the iOS threat uses enterprise provisioning to attack non-jailbroken iOS devices […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps
  • Good App/Bad App: Is Investigating Mobile Apps Necessary?

    TrendLabs - Malware Blog
    These days, when you see someone staring intently or tapping at their mobile phones, chances are that they’re busy with an app. This comes as no surprise as 80% of consumers’ time on mobile devices apps is spent in apps for gaming, news, productivity, utility, social networking, and more. Safe and Risky Apps We are currently […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroGood App/Bad App: Is Investigating Mobile Apps Necessary?
  • Four Steps To An Effective Targeted Attack Response

    TrendLabs - Malware Blog
    For many organizations today, the question is no longer if they will fall victim to a targeted attack, but when. In such an event, how an organization responds will determine whether it becomes a serious event or if it stays a mere annoyance. This requires something of a change of mindset for information security professionals. Previous techniques and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFour Steps To An Effective Targeted Attack Response
  • ROVNIX Infects Systems with Password-Protected Macros

    TrendLabs - Malware Blog
    We recently found that the malware family ROVNIX is capable of being distributed via macro downloader. This malware technique was previously seen in the DRIDEX malware, which was notable for using the same routines. DRIDEX is also known as the successor of the banking malware CRIDEX. Though a fairly old method for infection, cybercriminals realized that using malicious macros work […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroROVNIX Infects Systems with Password-Protected Macros
  • A Peek Inside a PoS Scammer’s Toolbox

    TrendLabs - Malware Blog
    PoS malware has been receiving a tremendous amount of attention in the past two years with high profile incidents like Target, Home Depot, and Kmart. With the massive “Black Friday” shopping season coming up, PoS malware will surely get additional publicity. This high profile nature means, we constantly look for evolving PoS malware and look into their behavior […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroA Peek Inside a PoS Scammer’s Toolbox
  • Patched Windows Vulnerability Allows For Remote Privilege Escalation

    TrendLabs - Malware Blog
    Microsoft has released an out-of-band security bulletin (MS14-068) that addresses a vulnerability in the implementation of Kerberos in various versions of Windows. The bulletin states that this vulnerability is already being used in “limited, targeted attacks”. This warning, plus the fact that Microsoft considered this threat serious enough to merit an out-of-cycle patch, should make users consider […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPatched Windows Vulnerability Allows For Remote Privilege Escalation

Market Place