A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions. The malware is a backdoor, or a kind of software that allows an attacker to execute various actions on a ...
Tags: Computer Products, softare
Twitter users in Japan have been warning of a growing number of messages with embedded links that cause mobile and PC browsers to display taunting messages and freeze. Many of the messages are sent by what appear to be dummy accounts with ...
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who say the extent of the problem is exaggerated. The security industry has an ...
Tags: antivirus companies, Android malware threats, credibility issue
A botnet that has been in the eye of researchers for years continues to serve up malware, spam and fake antivirus software, according to research by Trend Micro. The security vendor released a 30-page paper on Asprox, a long-running ...
Tags: Computer Products, software, Computer
Anti-virus software vendors have unveiled a number of upgrades to their systems, including new heuristic detection based on their signature databases, and new protections against botnets. Trend Micro has introduced new tools in its Custom ...
Trend Micro is adding the often confusing world of Facebook privacy settings to a new version of its flagship security software. Version 3 of the company's Trend Micro Mobile Security, available for Android users this week, will check a ...
Tags: Trend Micro, Facebook privacy settings, security software
Several Certificate Authorities (CAs) have formed an advocacy group called the Certificate Authority Security Council (CASC), which will focus on promoting new security standards, policies and best practices for SSL (Secure Sockets Layer) ...
Tags: CAs, web security, SSL deployment
A Russian man accused of being a key figure behind the notorious and hugely successful Reveton “police ransom” malware, which has successfully blackmailed thousands of PC users across the world, has been arrested in Dubai, ...
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday. ...
Tags: Whitehole, underground market, malware, antivirus software
Security watchdogs are now worried about a new attack vendor that cybercriminals could take advantage of – the growing number of devices that routinely use the Internet to function. Machine-to-machine (M2M) security is closely ...
Tags: security watchdogs, attack vendor, cybercriminals, M2M
A disgruntled employee, angry at missing out on a pay rise, conducted a three-year campaign of sabotage against his company's computers by spraying the cleaning product Cillit Bang into the grills of the servers. Credit controller Edward ...
RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat ...
Tags: RSA, security threats, big data management, analytics approaches
Cyber criminals have moved beyond the traditional PC, targeting Android, social media and even the Mac OS X with new attacks, according to Trend Micro’s 2012 Annual Roundup and Mobile Security reports. Malware targeting Android alone ...
Tags: cyber criminals, traditional PC, Android, social media
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers. Oracle released two emergency patches on Sunday for its Java programming language and ...
Tags: Trend Micro, malicious software, Java