Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • NewPosThings Has New PoS Things

    TrendLabs - Malware Blog
    Arbor Networks initially posted about a new point-of-sale (PoS) malware family named NewPosThings last September, which we detect as either TSPY_POSNEWT.SM or TSPY_POSNEWT.A. We are now seeing new developments in this area—namely, versions for 64-bit and higher. The 64-bit version is out Similar to the previous 32-bit version reported last year, the 64-bit sample is […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNewPosThings Has New PoS Things
  • Crypto-Ransomware Sightings and Trends for 1Q 2015

    TrendLabs - Malware Blog
    It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the threat landscape. In January, the Australia-New Zealand region was beset by variants of TorrentLocker. But we soon discovered that TorrentLocker infections were not limited to that region; Turkey, Italy, […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCrypto-Ransomware Sightings and Trends for 1Q 2015
  • The Resurrection of CVE-2011-2461

    TrendLabs - Malware Blog
    Security researchers Luca Carettoni and Mauro Gentile recently found during their research that even though Adobe has fixed an old vulnerability found in 2011 (CVE-2011-2461), its side effects still linger around the Internet. Your favorite websites might still be affected by this bug. They have shared great details in their blog post. Let’s take a quick look […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Resurrection of CVE-2011-2461
  • Securing The IT Supply Chain

    TrendLabs - Malware Blog
    The security of an enterprise is not only dependent on the organization itself, but also on the security of their IT supply chain and contractors. These represent potential weak points into the security of any organization. Third-party contractors and suppliers have been used to compromise larger organizations. Target’s breach began with a breach of a […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSecuring The IT Supply Chain
  • Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority

    TrendLabs - Malware Blog
    Recently, we’ve come across an interesting spam campaign aimed at French users. The campaign itself uses a well-crafted lure that is likely to catch the attention of its would-be victims. In addition, the malware used – the GootKit backdoor – contains several unusual technical characteristics. Both of these highlight how this campaign was quite well thought-out […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFake Judicial Spam Leads to Backdoor with Fake Certificate Authority
  • Single-use Yahoo Passwords – Good or Bad?

    TrendLabs - Malware Blog
    Yahoo recently rolled out a new way for users to access their services without entering a password. Their new system uses a cellphone to authenticate the user. Instead of entering a password, the user receives a verification code via text message on their phone. (The user would have provided their phone number to Yahoo when setting […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSingle-use Yahoo Passwords – Good or Bad?
  • URSNIF: The Multifaceted Malware

    TrendLabs - Malware Blog
    The URSNIF malware family is primarily known for being a data-stealing  malware, but it’s also known for acquiring a wide variety of behavior. Known URSNIF variants include backdoors (BKDR_URSNIF.SM), spyware (TSPY_URSNIF.YNJ), and file infectors (PE_URSNIF.A-O). December 2014: Rise in URSNIF infections brought about by file infection routines In December 2014 we discussed a rise in URSNIF infections, […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroURSNIF: The Multifaceted Malware
  • Macro-based Malware Increases Along with Spam Volume, Now Drops BARTALEX

    TrendLabs - Malware Blog
    Early this year Microsoft reported an increase in macro-related threats being used to spread malware via spam. Similarly, we’ve been seeing a drastic increase in spammed emails with attached Microsoft Word documents and Microsoft Excel spreadsheets that come with embedded macros. Macros are a set of commands or code that are meant to help automate […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMacro-based Malware Increases Along with Spam Volume, Now Drops BARTALEX
  • Sextortion in the Far East Includes Mobile Spyware

    TrendLabs - Malware Blog
    Today, personal communication is greatly enabled and enhanced by various messaging apps that provide text messaging, voice calls, photo sharing, and even video chat. These apps are often found in smartphones—devices that have all the features of a desktop computer, plus Wi-Fi, cellular, GPS, and data connectivity. Cybercriminals have taken advantage of the convergence of the power of the smartphone […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSextortion in the Far East Includes Mobile Spyware
  • DMARC and Spam: Why It Matters

    TrendLabs - Malware Blog
    Recently I discussed how TorrentLocker spam was using email authentication for its spam runs. At the time, I suggested that these spam runs were using email authentication to gather information about victim networks and potentially improve the ability to evade spam filters. DomainKeys Identified Mail’s (DKIM) own specification mentions the possibility of messages with from “trusted sources” and with a […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDMARC and Spam: Why It Matters

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place