Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
In 2013, retail chain Target was reportedly victimized by point-of-sales malware. After that, PoS malware creators show no signs of slowing as they continue to manufacture variant after variant.
Domain Generation Algorithm (DGA) is used by most malware to mask C&C activities. ZeuS/ZBOT variants of Gameover has upped the ante by employing a different DGA technique that makes detection more difficult.
Like a thousand ways to skin a cat, there are a number of ways malware avoid detection. POWELIKS malware, for example, hides in the Windows registry. Trend Micro analyzes its behavior and makes sure that customers are safe from this malware.
Cryptoblocker is seen spreading in the US, France, and Japan, among other countries. New ransomware variants, on the other hand, are cropping up in the wild. Trend Micro investigates these malware further.
By targeting session tokens sent via SMS in an elaborate fashion, a cybercriminal gang is able to intercept two-factor authentication and get your banking credentials. This attack is dubbed Operation Emmental.
Cross-platform mobile threats are here to stay, and with their capability of jumping from a user's mobile device to their PC (and vice versa), protecting against them is a top priority.