Friday, December 13, 2019
Latest:
  • Boots text message scam
  • 42 Apps 8 Million Downloads all part of an Adware campaign
  • Antivirus Evasion with Python
  • Russian Bears Need Less Than 20 Minutes To Hack Your Data
  • Microsoft: Russia’s Fancy Bear Working to Influence EU Elections
Security I Trust

Security I Trust

We Help You Protect Your Business

  • Keeping Kids Safe Online
    • Educating Kids about online safety
    • Sexting
  • Security Tools
    • IT Forensic Tools
      • Autopsy
      • EnCase Portable
      • FTK
      • Mobile Device Forensics
        • Iphone analyzer
      • Recover Lost or Deleted Files
    • IT Security Operating Systems
    • Network Security Scanning Tools
      • Nessus
    • Network Sniffing tools
      • Wire shark
    • Password Tools
      • Password strength check
      • Secure Password Creator
    • Vulnerability Exploitation Tools
    • Website Penetration Testing tools
      • Acunetix Web Vulnerability Scanner
      • Burp Suite
      • Grendal Scan
      • Nikto
      • Paros Proxy
      • WebInspect
      • WebScarab
      • Wikto
  • Training
    • Cyber CSI
    • Hands-on Forensics and Pen-testing Course
      • Maltego
      • useful videos
    • Pen Testing & Ethical Hacking
  • Treat Landscape
  • Contact
    • Contact
    • Cookie Policy
    • Privacy Policy
    • Terms and Conditions
    • About
IT Security News Online Fraud Scam Alert 

Boots text message scam

November 1, 2019November 1, 2019 admin 0 Comments

Many people across Ireland are receiving text messages that claim they have come from Boots and that you have won

Read more
IT Security News 

42 Apps 8 Million Downloads all part of an Adware campaign

October 25, 2019 admin 0 Comments

42 apps on the Google Play Store created by a Vietnamese university student were identified by a cybersecurity researchers as

Read more
Emerging Threats Info Research 

Antivirus Evasion with Python

July 18, 2019 admin 0 Comments AV

When deploying defense in depth security controls for your organization, you are likely to include antiviruses as part of the

Read more
Hacking attack Info 

Russian Bears Need Less Than 20 Minutes To Hack Your Data

February 22, 2019 admin 0 Comments

Russian bears lead the way when it comes to gaining enough of a foothold in your networks to perform a

Read more
IT Security News 

Microsoft: Russia’s Fancy Bear Working to Influence EU Elections

February 22, 2019 admin 0 Comments

As hundreds of millions of Europeans prepare to go to the polls in May, Fancy Bear ramps up cyber-espionage and

Read more
Info IT Security News 

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

February 22, 2019February 22, 2019 admin 0 Comments

1Password, Dashlane, KeePass and LastPass each downplay what researchers say is a flaw in how the utilities manage memory. Secure

Read more
Info IT Security News 

AV-TEST Awards 2018 go to TrendMicro

February 22, 2019February 22, 2019 admin 0 Comments

Only the best IT protection solutions are contenders for the internationally recognized AV-TEST Awards. After all, with this award, the

Read more
IT Security News News 

Cryptocurrency Exchange loses access to €130m in funds

February 5, 2019February 5, 2019 admin 0 Comments

Where is the safest place to store cryptocurrency has always been a debated issue, some say offline, others say online,

Read more
Info 

Cryptomining Malware Uninstalls Cloud Security Products

January 23, 2019January 23, 2019 admin 0 Comments

New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products. Researchers say they have discovered a unique

Read more
Info 

Google Fined $57M in Largest GDPR Slap Yet

January 23, 2019January 23, 2019 admin 0 Comments

The French Data Protection Authority (DPA) found a lack of transparency when it comes to how Google harvests and uses

Read more
  • ← Previous

Categories

  • Cloud Security (5)
  • CYBER BULLYING (1)
  • Data Protection (6)
  • DataBreach (3)
  • Emerging Threats (17)
  • Evolution of Security (14)
  • Hacking attack (4)
  • Home User IT Security (19)
  • Info (48)
  • Intellectual Property Theft (4)
  • IT Risk Management (2)
  • IT Security Awareness (11)
  • IT Security Ireland (18)
  • IT Security News (80)
  • IT Security Tips (12)
  • IT Security Training (3)
  • Malicious Code (4)
  • Mobile & Wireless (5)
  • Mobile Security (6)
  • News (65)
  • Online Fraud (18)
  • Phishing (2)
  • Products (5)
  • Research (2)
  • Scam Alert (70)
  • Security Advisories (13)
  • Security Alerts (33)
  • Security Breach (1)
  • Security Risks (4)
  • Social Engineering (2)
  • Software Review (4)
  • Spam (64)
  • SSL (2)
  • Vulnerabilities & Exploits (13)
  • Vulnerability Alerts (11)
  • Web Security (11)
Boots text message scam
IT Security News Online Fraud Scam Alert 

Boots text message scam

November 1, 2019 admin 0
42 Apps 8 Million Downloads all part of an Adware campaign
IT Security News 

42 Apps 8 Million Downloads all part of an Adware campaign

October 25, 2019 admin 0
Antivirus Evasion with Python
Emerging Threats Info Research 

Antivirus Evasion with Python

July 18, 2019 admin 0
Russian Bears Need Less Than 20 Minutes To Hack Your Data
Hacking attack Info 

Russian Bears Need Less Than 20 Minutes To Hack Your Data

February 22, 2019 admin 0

RSS Trendmicro.com Anti-Malware

  • (Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing December 12, 2019
    Cryptocurrencies' values are increasing again, which may explain why the number of stealthy techniques to deliver them have also increased this year. We found another campaign using process hollowing and a dropper component to evade detection and analysis, and can potentially be used for other malware payloads. The post (Almost) Hollow and Innocent: Monero Miner […]
  • Waterbear is Back, Uses API Hooking to Evade Security Product Detection December 11, 2019
    In one of its recent campaigns, we’ve discovered a piece of Waterbear payload with a brand-new purpose: hiding its network behaviors from a specific security product by API hooking techniques. In our analysis, we have discovered that the security vendor is APAC-based, which is consistent with BlackTech’s targeted countries.  The post Waterbear is Back, Uses […]
  • December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes December 11, 2019
    Microsoft released a total of 36 patches for December’s Patch Tuesday. Decembers tend to have a relatively low number of patches, and the last Patch Tuesday of the 2010s was no different. Seven of the 36 patches were identified as Critical, 28 Important, and one Moderate. The vulnerabilities covered a wide variety of Microsoft products, […]
  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign December 4, 2019
    In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws. During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristics: notably that these samples were making use of […]
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack December 2, 2019
    We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which exhibit many cyberespionage behaviors, are initially used for a targeted attack campaign. We first came across the threat in May on the site http://gooogle.press/, which was advertising a chat app called “Chatrious.” Users can download […]
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK November 29, 2019
    We found cyberespionage group TICK targeting critical systems and enterprises, attempting to steal information to benefit this APT group's sponsor. In this research brief, we show the timeline of the group's activities and malware development, as well as the technical analyses of the new malware families, modified tools, and upgraded malware routines. The post Operation […]
  • Patched GIF Processing Vulnerability CVE-2019-11932 Still Afflicts Multiple Mobile Apps November 25, 2019
    CVE-2019-11932, which is a vulnerability in WhatsApp for Android, was first disclosed to the public on October 2, 2019 after a researcher named Awakened discovered that attackers could use maliciously crafted GIF files to allow remote code execution. The vulnerability was patched with version 2.19.244 of WhatsApp, but the underlying problem lies in the library […]
  • Mac Backdoor Linked to Lazarus Targets Korean Users November 20, 2019
    By Gabrielle Joyce Mabutas Criminal interest in MacOS continues to grow, with malware authors churning out more threats that target users of the popular OS. Case in point: A new variant of a Mac backdoor (detected by Trend Micro as Backdoor.MacOS.NUKESPED.A) attributed to the cybercriminal group Lazarus, which was observed targeting Korean users with a... […]
  • More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting November 14, 2019
    The threat group APT33 is known to target the oil and aviation industries aggressively. Our recent findings show that the group uses about a dozen live Command and Control (C&C) servers for extremely narrow targeted malware campaigns against organizations in the Middle East, the U.S., and Asia. The post More than a Dozen Obfuscated APT33 […]
  • Microsoft November 2019 Patch Tuesday Reveals 74 Patches Before Major Windows Update November 13, 2019
    Following the relatively light list from last month, November proved to be a much more eventful month for Microsoft users. The November Patch Tuesday holds more fixes with a total of 74 patches, 13 of which were classified as Critical patches for remote code execution (RCE) vulnerabilities. The remaining majority were rated as Important and […]

RSS Security Iintelligence

  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about stalkerware and why it’s on the rise. Also, read about Trend Micro’s selection as a launch partner for the new Amazon Virtual Private Cloud (Amazon... […]
  • You’re In Safe Hands with Trend Micro Home Network Security
    A three-part series on using Home Network Security to protect your home Your home should be a haven that protects you. In the cyber age, however, your router, computers, and TVs, your game consoles and smart devices, are continuously connected to the internet and run the risk of being hacked—usually when you least expect it... […]
  • Network security simplified with Amazon VPC Ingress Routing and Trend Micro
    Today, Amazon Web Services (AWS) announced the availability of a powerful new service, Amazon Virtual Private Cloud (Amazon VPC) Ingress Routing. As a Launch Partner for Amazon VPC Ingress Routing, we at Trend Micro are proud to continue to innovate alongside AWS to provide solutions to customers—enabling new approaches to network security. Trend Micro™ TippingPoint™... […]
  • What Worries CISOs Most In 2019
    We recently held a valuable conversation (and a great dinner) with about a dozen senior IT security leaders in Atlanta, Georgia. I was fortunate to attend and discuss what plagues them most. Here are some of their concerns. Many face considerable change in their business environments – one third of the companies called out the... […]
  • Stalking the Stalkerware
    Ever get the feeling you’re being followed? Unfortunately, when it comes to our digital lives, this is increasingly the case. But while we’re all keen to boost our followers on social media, it’s a different matter when it comes to anonymous third parties secretly stalking us online. Yes, we’re already tracked by ISPs every time... […]
  • This Week in Security News: Skimming and Phishing Scams Ahead of Black Friday and Polish Hacking Team Wins Capture the Flag Competition
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about recent skimming and phishing scams as we head into the holidays and how you can protect yourself and your organization. Also, read about how the... […]
  • This Week in Security News: Trend Micro Unveils New Cloud Security Platform, plus Thousands of Disney+ Accounts are Compromised
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend’s new Cloud One platform that provides workload, container, file object storage, serverless and application, and network security. Also, read about the recent Disney+ account... […]
  • Warning! Windows 10 Fake Update is Actually Ransomware
    Microsoft never sends updates via email. Many folks don’t know that, which is why a new ransomware campaign masquerading as a Windows 10 update is so pernicious. You may have already gotten a fake notice saying “Install Latest Microsoft Update Now!” Or “Critical Microsoft Windows Update!”, with the body of the message asking you to... […]
  • Online Phishing: How to Stay Out of the Hackers’ Nets
    Despite the growing popularity of social media and messaging apps, email remains the preferred way to communicate online for millions of Americans. And the bad guys know it. Of the 28.6 billion cyber-threats Trend Micro blocked globally in the first half of 2019, over 24.3 billion were carried by email. That’s 91%. Many of these... […]
  • How To Be An Informed Skeptic About Security Predictions
    It doesn’t take a wily prediction to see that the cycles of tech procurement and planning are increasingly compressed. In enterprise IT, the two largest forces at play are business changes and technology changes. These two major forces are somewhat independent; a lot of tech change happened during the last economic downturn, and in fact... […]
Copyright © 2019 Security I Trust. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.
This website uses cookies to improve the user experienceMore information about the EU cookie directive