Keyword: possible
495 Total Search   |   Showing Results : 61 - 80
Description Name: Possible Brute force - Telnet (Response) .
Description Name: Possible ZEUS - HTTP (Request) - Variant 2 . This is the Trend Micro detection for malicious N/A network packet that manifest any of the following actions:CallbackThis attack is used for Command and Control Communication
Description Name: Possible XML External Entity Attack - HTTP (Response) .
AndroidManifest.XML file. Attackers may exploit this via a malicious application to launch privilege escalation attack to the Android security model to change received status and date of SMS/MMS. Other possible attack
making rounds today. It even entices users to place their orders as soon as possible to get the supposedly discount. It has a link, http://{BLOCKED}hinc.com , which Trend Micro detects as malicious. Users
the .PDF file shows a URL to fake NACHA sites, which are now classified under 'Disease Vector' due to possible malware download.
a list of possible passwords. NOTES: This hacking tool uses the following user interface: not-a-virus:PSWTool.Win32.Brutus (Kaspersky), Riskware/PWCrack (Fortinet) Displays graphics/image
An email that poses as a notification of a possible account compromise carries an attachment that is detected as DRIDEX malware. To convince users to open the attachment, it instructs recipients to
This is the Trend Micro generic detection for potentially unwanted applications (PUAs) that are installed in your computers or devices. This application is detected as carrying a possible risk of
security and identify possible avenues of intrusion.
This is the Trend Micro generic detection for potentially unwanted applications (PUAs) that are installed in your computers or devices. This application is detected as carrying a possible risk of
input. By Creating a specially crafted request to a script, it would be possible to read random files on the system. Microsoft Index Server 2.0,Indexing Service in Windows 2000 Users of Trend Micro
' as it does not contain any malicious files and/or links. However, users should be wary and avoid replying to such emails. It is possible that the attacker behind this spam attack could just be fishing
girlfriend? http:// www. {BLOCKED}vesms.com === Now, it's possible to read other people's SMS http:// www. {BLOCKED}vesms.com === Read other people's sms without registration http:// www. {BLOCKED}vesms.com ==
In December 2010, there was a noticeable dip in the volume of spam sent. This was attributed to two possible causes: the decline in spam-sending activity of Rustock botnet and the Spamit takedown
Details This Trojan does the following: Loads and runs the Java class iqtoL__.class (detected as TROJ_JAVA.BW) to allow all possible permissionsin the malware package, which include access to users' files,
Description Name: Possible Router Exploit Kit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromise...
Description Name: Possible SPELEVO - Exploit Kit -HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromi...
Description Name: Possible IE Exploit - HTTP (Response) - Variant 4 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compro...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Database MySQL 1005045* - MySQL Database Server Possible Login Brute Force Attempt Web Application PHP Based 1006432* -