Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • The Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps

    TrendLabs - Malware Blog
    Based on our research into the iOS threat Masque Attacks announced last week, Trend Micro researchers have found a new way that malicious apps installed through successful Masque Attacks can pose a threat to iOS devices: by accessing unencrypted data used by legitimate apps. According to reports, the iOS threat uses enterprise provisioning to attack non-jailbroken iOS devices […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps
  • Good App/Bad App: Is Investigating Mobile Apps Necessary?

    TrendLabs - Malware Blog
    These days, when you see someone staring intently or tapping at their mobile phones, chances are that they’re busy with an app. This comes as no surprise as 80% of consumers’ time on mobile devices apps is spent in apps for gaming, news, productivity, utility, social networking, and more. Safe and Risky Apps We are currently […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroGood App/Bad App: Is Investigating Mobile Apps Necessary?
  • Four Steps To An Effective Targeted Attack Response

    TrendLabs - Malware Blog
    For many organizations today, the question is no longer if they will fall victim to a targeted attack, but when. In such an event, how an organization responds will determine whether it becomes a serious event or if it stays a mere annoyance. This requires something of a change of mindset for information security professionals. Previous techniques and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFour Steps To An Effective Targeted Attack Response
  • ROVNIX Infects Systems with Password-Protected Macros

    TrendLabs - Malware Blog
    We recently found that the malware family ROVNIX is capable of being distributed via macro downloader. This malware technique was previously seen in the DRIDEX malware, which was notable for using the same routines. DRIDEX is also known as the successor of the banking malware CRIDEX. Though a fairly old method for infection, cybercriminals realized that using malicious macros work […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroROVNIX Infects Systems with Password-Protected Macros
  • A Peek Inside a PoS Scammer’s Toolbox

    TrendLabs - Malware Blog
    PoS malware has been receiving a tremendous amount of attention in the past two years with high profile incidents like Target, Home Depot, and Kmart. With the massive “Black Friday” shopping season coming up, PoS malware will surely get additional publicity. This high profile nature means, we constantly look for evolving PoS malware and look into their behavior […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroA Peek Inside a PoS Scammer’s Toolbox
  • Patched Windows Vulnerability Allows For Remote Privilege Escalation

    TrendLabs - Malware Blog
    Microsoft has released an out-of-band security bulletin (MS14-068) that addresses a vulnerability in the implementation of Kerberos in various versions of Windows. The bulletin states that this vulnerability is already being used in “limited, targeted attacks”. This warning, plus the fact that Microsoft considered this threat serious enough to merit an out-of-cycle patch, should make users consider […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPatched Windows Vulnerability Allows For Remote Privilege Escalation
  • POWELIKS Levels Up With New Autostart Mechanism

    TrendLabs - Malware Blog
    Last August, we wrote about POWELIKS’s malware routines that are known for hiding its malicious codes in the registry entry as part of its evasion tactics. In the newer samples we spotted, malware detected as TROJ_POWELIKS.B employed a new autostart mechanism and removes users’ privileges in viewing the registry’s content. As a result, users won’t be able to suspect that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPOWELIKS Levels Up With New Autostart Mechanism
  • Localized Tools and Services, Prominent in the Brazilian Underground

    TrendLabs - Malware Blog
    In our monitoring of the global threat landscape, we tend to notice that countries sometimes are affiliated with a particular cybercriminal activity. One classic example is Brazil, which is known for its association with banking malware. As we noted in a previous blog entry, “[0]nline banking theft is especially rampant in the country, whose history of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroLocalized Tools and Services, Prominent in the Brazilian Underground
  • Flashpack Exploit Kit Used in Free Ads, Leads to Malware Delivery Mechanism

    TrendLabs - Malware Blog
    In the entry FlashPack Exploit Leads to New Family of Malware, we tackled the Flashpack exploit kit and how it uses three URLs namely (http://{malicious domain}/[a-z]{3}[0-9]{10,12}/loxotrap.php, http://{malicious domain}/[0-9,a-z]{6,10}/load0515p6jse9.php, http://{malicious domain}/[a-z]{3}[0-9]{10,12}/ldcigar.php) as its landing site. We monitored the abovementioned URLs and found out that the FlashPack exploit kit is now using free ads to distribute malware such as […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFlashpack Exploit Kit Used in Free Ads, Leads to Malware Delivery Mechanism
  • Fake Viber Spam Changes Routines Based on Platform

    TrendLabs - Malware Blog
    Earlier this week, we noticed that there was a spike in the volume of spammed messages that pretend to come from the messaging service Viber.  This app, which also has  a desktop version allows users for free calls and messages. The email informs the recipient that they have one voice message for their account. Figure 1. Sample […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFake Viber Spam Changes Routines Based on Platform

Market Place