Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • How Cybercriminals Dodge Email Authentication

    TrendLabs - Malware Blog
    Email authentication and validation is one method that is used to help bring down the levels of spam and phishing by identifying senders so that malicious emails can be identified and discarded. Two frameworks are in common usage today; these are SPF and DKIM. SPF (Sender Policy Framework): Defined in RFC 7208, SPF provides a […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroHow Cybercriminals Dodge Email Authentication
  • Doubts Raised About “Grinch” Linux Vulnerability

    TrendLabs - Malware Blog
    Security researchers have announced a new “vulnerability” in Linux dubbed “Grinch“, which allows for escalation-of-privilege attacks in versions of Linux that use the polkit toolkit for privilege authorization. However, the true threat of this vulnerability is much more limited. The bug was named after the holiday season and the Dr. Seuss character, as some would say that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDoubts Raised About “Grinch” Linux Vulnerability
  • What’s New in Exploit Kits in 2014

    TrendLabs - Malware Blog
    Around this time in 2013, the most commonly used exploit kit – the Blackhole Exploit Kit – was shut down after its creator, Paunch, was arrested by law enforcement. Since then, a variety of exploit kits has emerged and have been used by cybercriminals. The emergence of so many replacements has also meant that there […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWhat’s New in Exploit Kits in 2014
  • Evaluating the Security of Cyber-Physical Systems: AIS (Paper and Source Code Now Available)

    TrendLabs - Malware Blog
    When I am in the United States I tend to overwork, especially up in the air as many planes today are WiFi-enabled. I just got back from New Orleans, a city with a vibrant atmosphere that I found musically and culturally rich. New Orleans was the venue of this year’s Annual Computer Security Applications Conference […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroEvaluating the Security of Cyber-Physical Systems: AIS (Paper and Source Code Now Available)
  • Banking Trojan Targets South Korean Banks; Uses Pinterest as C&C Channel

    TrendLabs - Malware Blog
    We recently found a new banking Trojan which targeted to several banks in South Korea. This isn’t the first time, though: in June last year, we saw that several online banking threats widened its range of targets and targeted Korean banks using various techniques. Throughout the course of our monitoring similar threats, we noticed a new wave of banking […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBanking Trojan Targets South Korean Banks; Uses Pinterest as C&C Channel
  • Cross-Signed Certificates Crashes Android

    TrendLabs - Malware Blog
    We have discovered a vulnerability in Android that affects how cross-signed certificates are handled. No current Android release correctly handles these certificates, which are created when two certificates are signed with a looped certificate chain (certificate A signs certificate B; certificate B signs certificate A). We’ve already notified Google about this vulnerability, and there is no fix […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCross-Signed Certificates Crashes Android
  • Info-Stealing File Infector Hits US, UK

    TrendLabs - Malware Blog
    We noticed that there has been a spike in infections related to the malware URSNIF. The URSNIF family is known to steal information such as passwords. Spyware are always considered high risk, but these URSNIF variants can cause damage beyond info-stealing. These URSNIF variants are file-infectors—which is the cause of the noted spike. Infection Data Based on […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroInfo-Stealing File Infector Hits US, UK
  • REVETON Ransomware Spreads with Old Tactics, New Infection Method

    TrendLabs - Malware Blog
    Last week we wrote about a sudden hike in crypto-ransomware variants across the Europe, the Middle East and Africa (EMEA) region, specifically seen in Spain, France, Turkey, Italy, and the United Kingdom. In this blog post we will discuss another strain of ransomware known as REVETON, which was seen infecting systems in the United States […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroREVETON Ransomware Spreads with Old Tactics, New Infection Method
  • POODLE More Potent, Now Affects TLS

    TrendLabs - Malware Blog
    Patches to fix the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability in SSL first discussed in October have been gradually put in place since its discovery. We’ve recently uncovered that some transport layer security (TLS) implementations may be vulnerable to a variant of the same POODLE attack. This means that secure connections protected via TLS can, in certain conditions, be vulnerable to man-in-the-middle […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPOODLE More Potent, Now Affects TLS
  • Insider Threats 101: The Threat Within

    TrendLabs - Malware Blog
    Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of their very nature, it can be difficult to handle these problems, particularly because the mindset needed to handle them can vary. The insider threat can be broken down into three […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroInsider Threats 101: The Threat Within

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place