Web Attacks
Background of the Attack A vulnerability in the Oracle's Java application, Java Deployment Toolkit (JDT), was spotted by two security researchers and was publicly disclosed on April 9, 2010. Although ...
How does this threat get into users' systems?A Gumblar-related attack arrives when a user accesses a compromised site embedded with malicious code. These sites redirect the user to malicious websites ...
How does this threat get into users' systems?This threat arrives as a spammed message purportedly from the Bureau of the Shanghai World Expo. It contains a .
How does this threat get into users' systems?Users receive spammedmessages that suggestthat the embedded link leads to information on Michael Jackson's alleged murder.How does this threat affect users...
How does this threat get into users' systems?The threat arrives via spammed messagespurporting to come from the Federal Insurance Deposit Corporation (FDIC). The email messagestrick users into clickin...
How does this threat affect users?Users receive spammed messages supposedly from CNN Mexico containing news of Michael Jackson's untimely death.How does this threat affect users?Users who are tricked ...
How does this threat get into users' systems?WORM_IRCBOT.ABJ may be downloaded from remote site(s) by other malware or by an unknowing user when visiting a malicious Web site.
How does this threat get into users' systems?Users received spammed messages containing a malicious .PPT file attachment that supposedly contained updates on the Air France Flight 447 plane crash and ...
Background of the AttackTrend Micro received several reports and inquiries surrounding a series of attacks that exploited an application vulnerability to download HYDRAQ variants onto infected compute...