Webbedrohungen
How do users get this Web threat?Systems get infected by various binaries once users visit any site injected with a malicious script via MySQL. In this attack, malicious scripts lead users to either h...
How do users get this Web threat?Users searching for information via search engines unwittingly fall prey for a new Blackhat SEO attack. Query results for strings such as the video of reality TV celeb...
FAKEAV malware continue to evolve in terms of technology and social engineering tactics to keep up with the ongoing security industry efforts. The latest FAKEAV variants have rootkit components simila...
Background of the storyKOOBFACE is considered a revolutionary threat as it is the first malware family that have a successful and continuous run propagating in social networking sites. It was initiall...
Background of the AttackIn arecent spam run, TrendLabsSM engineers came across samplesof spammed messages using the right-to-left override (RLO) technique. The RLOtechnique, which was more commonly ...
Background of the AttackA new phishing attack that originatedfrom Mexicotakes advantage of the controversial news about an allegedly missingfour-year-old girl, Paulette Gebara Farah, who was later fou...
Background of the AttackIn a recent spam run, messages purporting to be an IT notification targeted several companies worldwide. The social engineering tactic may be old, but the use of a malicious .
Background of the AttackA Twitter bot builder, primarily created as a joke program, is currently being freely distributed on the Internet. While the tool is designed for harmless fun, it may used by m...
Background of the AttackLast March, the twin bombing attack in Russia shocked the world when two female suicide bombers blew themselves up in Moscow subway stations. Cybercriminals used this unfortuna...