Top IT Security Bloggers

Trend Micro - Security Intelligence
  • UK Conviction Arises out of Trend Micro and NCA Partnership

    Trend Micro - Security Intelligence
    On January 15, Goncalo Esteves from Essex, UK plead guilty on 3 charges of computer offenses under UK law:

    2 charges against Section 3A of the Computer Misuse Act 1990 (Making/adapting/supplying an article intended for use/to assist in commission of section 1 or 3 Computer Misuse offense)
    1 charge against Section 327(1) and Section 334 Proceeds of Crime Act 2002 (Concealing/disguising/converting/transferring/removing criminal property)

    This marks the result of a collaborative investigation that Trend Micro and the National Crime Agency (NCA) in the United Kingdom initiated back in 2015, when the two organizations signed a Memorandum of Understanding (MOU) to work together in the fight against cybercrime. This collaboration is not restricted to this case alone, with Trend Micro actively continuing to assist the UK, as well as other international law enforcement partners, in their fight against cybercrime.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    UK Conviction Arises out of Trend Micro and NCA Partnership
  • New KillDisk Variant Hits Financial Organizations in Latin America

    Trend Micro - Security Intelligence
    We came across a new variant of the disk-wiping KillDisk targeting financial organizations in Latin America. Trend Micro detects it as TROJ_KILLDISK.IUB. Trend Micro™ Deep Discovery™ proactively blocks any intrusions or attacks associated with this threat. Initial analysis (which is still ongoing) reveals that it may be a component of another payload, or part of a bigger attack. We are still analyzing this new KillDisk variant and we will update this post as we uncover more details about this threat.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    New KillDisk Variant Hits Financial Organizations in Latin America
  • Update on Pawn Storm: New Targets and Politically Motivated Campaigns

    Trend Micro - Security Intelligence
    The active espionage actor group Pawn Storm didn’t shy away from continuing their brazen attacks in the second half of 2017. Pawn Storm's attacks usually are not isolated incidents. We can often relate them to earlier attacks by carefully looking at the technical indicators and motives.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Update on Pawn Storm: New Targets and Politically Motivated Campaigns
  • New Mobile Malware Uses Layered Obfuscation and Targets Russian Banks

    Trend Micro - Security Intelligence
    Last year, we saw the Fanta SDK malware target Russian bank Sberbank users and employ unique defensive measures. Now, another bank malware family has appeared, targeting even more Russian banks while using new and evolved obfuscation techniques. This family is named FakeBank, and so far the related samples we have collected number in the thousands. These samples show that the malware targets not only Sberbank, but also other Russian banks like Letobank and the VTB24 bank.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    New Mobile Malware Uses Layered Obfuscation and Targets Russian Banks
  • January’s Patch Tuesday Fixes 56 Security Issues, Including Meltdown and Spectre

    Trend Micro - Security Intelligence
    This year’s first Patch Tuesday is a busy one. Microsoft released 56 updates that include patches for the Meltdown and Spectre vulnerabilities. The patches also addressed security issues in Windows OS, Internet Explorer, Edge, Office, ChakraCore, ASP.NET, and .NET Framework. Sixteen were rated critical and 38 important, 20 of which can result in remote code execution (RCE).
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    January’s Patch Tuesday Fixes 56 Security Issues, Including Meltdown and Spectre
  • First Kotlin-Developed Malicious App Signs Users Up for Premium SMS Services

    Trend Micro - Security Intelligence
    We spotted a malicious app (detected by Trend Micro as ANDROIDOS_BKOTKLIND.HRX) that appears to be the first developed using Kotlin—an open-source programming language for modern multiplatform applications. The samples we found on Google Play posed as Swift Cleaner, a utility tool that cleans and optimizes Android devices. The malicious app, which has 1,000-5,000 installs as of writing, is capable of remote command execution, information theft, SMS sending, URL forwarding, and click ad fraud. It can also sign up users for premium SMS subscription services without their permission.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    First Kotlin-Developed Malicious App Signs Users Up for Premium SMS Services
  • When Speculation Is Risky: Understanding Meltdown and Spectre

    Trend Micro - Security Intelligence
    For several days, rumors circulated about a serious vulnerability in Intel processors. It wasn’t until January 3 that the official disclosure of the Meltdown and Spectre vulnerabilities was made, and it became clear how serious the problems were. To summarize, Meltdown and Spectre both allow malicious code to read memory that they would normally not have permission to.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    When Speculation Is Risky: Understanding Meltdown and Spectre
  • Apps Disguised as Security Tools Bombard Users With Ads and Track Users’ Location

    Trend Micro - Security Intelligence
    In early December, we found a total of 36 apps on Google Play that executed unwanted behavior. These apps posed as useful security tools under the names Security Defender, Security Keeper, Smart Security, Advanced Boost, and more. They also advertised a variety of capabilities: scanning, cleaning junk, saving battery, cooling the CPU, locking apps, as well as message security, WiFi security, and so on. The apps were actually able to perform these simple tasks, but they also secretly harvested user data, tracked user location, and aggressively pushed advertisements.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Apps Disguised as Security Tools Bombard Users With Ads and Track Users’ Location
  • The Need for Better Built-in Security in IoT Devices

    Trend Micro - Security Intelligence
    As manufacturers develop Internet of Things (IoT) devices that integrate with widely popular internet-based applications, more and more users see the value in purchasing such devices. Ease of integration becomes an incentive for users to consider adding these products to their network of devices. But while the ease of use can be enticing, these products can also be susceptible to security issues that could introduce far-reaching problems.
    To see just how safe and secure IoT devices are and to what extent an attacker can manipulate an IoT device, we tested the built-in security of a particular IoT device type — internet-connected speakers.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    The Need for Better Built-in Security in IoT Devices
  • Janus Android App Signature Bypass Allows Attackers to Modify Legitimate Apps

    Trend Micro - Security Intelligence
    Android’s regular security update for December 2017 included a fix for a serious vulnerability that could allow attackers to modify installed apps without affecting their signature. This would allow an attacker to gain access to the affected device (indirectly). First found by researchers in July, this vulnerability (designated as CVE-2017-13156, and also called the Janus vulnerability) affects versions of Android from 5.1.1 to 8.0; approximately 74% of all Android devices have these versions installed.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Janus Android App Signature Bypass Allows Attackers to Modify Legitimate Apps

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release