Feeds

Articles about Trend Micro

Trend Micro buys Taiwanese deep packet sniffing firm

Global security firm Trend Micro, which has announced a deal to buy smaller network security firm Broadweb. Financial terms of the deal, announced Thursday, were not disclosed. Broadweb's deep packet inspection technology will be dovetailed into Trend's existing lines of network security kit to improve the blocking of malicious …
John Leyden, 11 Oct 2013

Trend Micro turns RAT catcher as Taiwan cops cuff hacker

Security vendor Trend Micro has embiggened its industry collaboration credentials this week after helping Taiwanese police arrest one man in connection with a widespread targeted attack, and teaming up with Interpol on a new cyber crime prevention centre. The targeted attack in question used the notorious Ghost remote access …
Phil Muncaster, 25 Jun 2013

You dirty RAT: Trend Micro spots new Asia-wide attack

Security researchers are warning of yet another advanced, large-scale attack campaign using sophisticated techniques to hide itself from its targets – organisations across Asia. Trend Micro has dubbed the campaign Naikon, based on the HTTP user-agent string “NOKIAN95/WEB” found in various targeted attacks across the region in …
Phil Muncaster, 14 Jun 2013
The Register breaking news

Trend Micro squishes 'stuck in a loop' SafeSync bug

Trend Micro has issued software patches for its SafeSync product after some users complained that the software was not syncing files between two or more devices properly. Posts of complaints on a user forum, and a tip from a Reg reader, suggested the software's synchronisation of files between devices was not functioning and …
John Leyden, 13 Nov 2012
The Register breaking news

New trend: Trojan which steals your pics instead of your text

Miscreants have developed a strain of malware that steals image files from compromised systems. The Pixsteal-A Trojan dispenses with the conventional tactic of only stealing text files, instead concentrating on uploading .jpg, .jpeg, and .dmp (memory dump) files from infected machines onto a remote FTP server. The switch in …
John Leyden, 06 Nov 2012
The Register breaking news

Android malware under blog control says Trend Micro

Trend Micro is reporting a Chinese Android malware that operates partly under the command and control of a blog. The ANDROIDOS_ANSERVERBOT.A malware is disguised as an e-book reader offered on a third-party Chinese app store. It uses two command and control servers, one of them served out of a blog with encrypted posts. Posts to …
arrow pointing up

Trend Micro buys encryption firm

Trend Micro has agreed to buy encryption specialist Mobile Armor. Financial terms of the deal, announced on Tuesday, were not disclosed. St Louis, Missouri-based Mobile Armor markets data-protection software that offers full-disk, file/folder, and removable media encryption for endpoints (laptops, tablet PCs, and smartphones). …
John Leyden, 30 Nov 2010

Another day, another nasty Android vuln

The security researcher who last year sucked thousands of IDs out of Apple's Developer Centre site has turned his gaze onto Android and turned up a bug that Trend Micro says is exploitable. According to Ibrahim Balic, the bug causes memory corruption on Android 4.2.2 , 4.3 and 2.3 at least, but he suspects all Android versions …
Malware

Attackers raid SWISS BANKS with DNS and malware bombs

Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system settings, researchers have warned. The attacks sported a clever implementation of malware that pointed victim machines to replica phishing bank sites when they attempt to …
Darren Pauli, 23 Jul 2014
 Dummy hand grenades are used by the Marines from the 3rd Low Altitude Air Defense Battalion, for practice before throwing the M-67 Fragment Grenades at the firing range.jpg

Dropbox used as command and control for Taiwan time bomb

A remote access trojan (RAT) is using Dropbox for command and control in a targeted attack against the Taiwanese Government, malware analyst Maersk Menrige says. The upgraded PlugX RAT is the first targeted attack to use Dropbox to update command and control settings, Menrige said, as distinct from other malware and ransomware …
Darren Pauli, 30 Jun 2014

Not your father's spam: Trojan slingers attach badness to attachment WITHIN attachment

Cybercrooks are upping the ante by loading malware as an attachment inside another attachment in a bid to slip past security defences. A new variant of the Upatre Trojan comes bundled in spammed messages that imitate emails from known banks such as Lloyds Bank and Wells Fargo. The .MSG file of the malicious emails contains …
John Leyden, 08 Apr 2014
The Register breaking news

Trend Micro lays down bread for humyo cloud service

Trend Micro has bought UK-based consumer and micro business cloud storage service provider humyo, with the target's file synchronisation technology apparently the cherry on the cake. This technology syncs files between a users' connected devices and humyo's cloud vault, meaning the humyo cloud is like Dropbox with added …
Chris Mellor, 14 Jun 2010

Like WhatsApp? Meet 'desktop' version... and his BANK ACCOUNT RAIDING Trojan pal

Scammers have slung together a scam designed to trick users into running malware disguised as a "desktop version" of the ultra-popular WhatsApp mobile messaging app. Links promoted through a run of spam emails that began appearing last week actually lead to a banking Trojan rather than a PC version of the mobile-only app, Trend …
John Leyden, 26 Feb 2014

China's mobile underground revealed in new report

China plays host to a vast and highly sophisticated “mobile underground” where cyber criminals can buy the tools to launch attacks for as little as 100 yuan (£9.70), according to a new report from security vendor Trend Micro. The Mobile Cybercriminal Underground Market in China is the firm's follow up to two separate reports on …
Phil Muncaster, 04 Mar 2014

Flappy Bird's ANIMATED CORPSE may spread malware PLAGUE

Cybercrooks have been quick to latch onto the hype about Flappy Bird's demise by laying a variety of malware-based traps. Counterfeit Flappy Bird Android apps packing malware have been spotted all over the web, with sightings by both Trend Micro and Sophos, among others. Trend warns that counterfeit copies of the mobile game …
John Leyden, 12 Feb 2014
The Register breaking news

Trend Micro to eyeball malware from cloud

Trend Micro has unveiled a major update to its flagship scanning tools that puts your virus signature database online, plus a modular security and system management suite with partner BigFix. Trend Micro's updated OfficeScan Client/Server Suite includes an interesting change to the way its flagship scanning software keeps its …
Austin Modine, 13 Apr 2009
Autodesk's AutoCAD

Rare AutoCAD malware rigs drafting machines for follow-up attacks

Security researchers have discovered a rare strain of AutoCAD malware that opens up compromised machines to secondary exploits. ACM/SHENZ-A poses as a legitimate component of AutoCAD software for computer-aided design (CAD). But analysis by security researchers at Trend Micro has revealed that the malicious file opens up systems …
John Leyden, 25 Nov 2013
Windows Vista teaser

Trend Micro boosts Vista package, extends Hotmail deal

Security provider Trend Micro yesterday announced a brace of Microsoft-based strategies, rolling out improvements for its combo offering on Vista and proclaiming that it will handle antivirus for Hotmail/Live webmail services for a further year. Users running Trend Micro Internet Security on Vista platforms get two enhancements …
Lewis Page, 26 Jun 2007

Trend Micro buys leak prevention firm

Trend Micro has acquired data leak prevention firm Provilla, in an agreement that expands its business beyond its core antivirus and content security markets. Financial terms are undisclosed. Data leaks potentially expose firms to security, intellectual property, financial, privacy and compliance threats. Provilla's technology …
John Leyden, 25 Oct 2007
dropbox privacy security eye

Dropbox squashes boring bug, restores file sharing

Dropbox has restored sharing services after patching a flaw that allowed attackers to access shared files under specific conditions. The simple vulnerability meant the location of the shared files could be disclosed to website administrators via referral headers. That would only happen if a user clicked a link to the website …
Darren Pauli, 07 May 2014

CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes

Miscreants have brewed up a variant of the infamous CryptoLocker ransomware that uses worm-like features to spread across removable drives. The recently discovered CRILOCK-A variant can spread more easily than previous forms of CryptoLocker. The latest nasty is also notable because it comes under previously unseen guises - such …
John Leyden, 02 Jan 2014

Stale Blackhole leads to dried-up spam, claim badhat-probers

Security researchers at Trend Micro reckon that Blackhole, cybercrooks' preferred tool for running drive-by download attacks from compromised websites, is no longer being updated. This means the utility - which was available for rent at around $50 a day - has quickly gone stale. Nature abhors a vacuum, though, and malware- …
John Leyden, 12 Nov 2013

IEEE expands malware initiatives

Standards body the IEEE has launched two new anti-malware initiatives designed to help software and security vendors spot malware that's been inserted into other software, and improve the performance of malware detection by cutting down on false positives. The organisation's Anti-Malware Support Service (AMSS) is designed to …
channel

Trend Micro snaps up UK-based email crypto firm

Trend Micro, the security firm best known for its PC-cillin anti-virus software, has acquired UK-based email encryption firm Identum. Terms of the deal, announced Monday, were undisclosed. Identum's email encryption technology will be rolled into Trend's existing portfolio of content and web-security products under the Trend …
John Leyden, 25 Feb 2008

Obamacare goes LIVE, and so do the survey-spewing spambots

Obamacare-related spam scams surfaced well before sign-ups to the controversial Affordable Care Act began on Tuesday, 1 October. Spam containing the terms “medicare”, “enrollment” and “medical insurance” started surfacing during the first week of September and continues to clog users' inboxes. Links in the spam messages …
John Leyden, 03 Oct 2013

Forget ski-jumping – Russians setting records in Sochi visitor hacking

It isn't just athletes that have been training hard for the Winter Olympics in Sochi; Russian hackers have also been sharpening their skills to harvest a wealth of valuable data from visitors to the event. But they're not as fast as some of the more excitable reports from the troubled event are telling it. "The State Department …
Iain Thomson, 05 Feb 2014

Hackers prowl for Trend Micro vuln

Hackers have begun actively scanning for recently announced vulnerabilities in Trend Micro's ServerProtect product. Security watchers at the Internet Storm Centre (ISC) have noted a huge upsurge of traffic on TCP port 5168, associated with security bugs in ServerProtect (an enterprise software product designed to protect …
John Leyden, 23 Aug 2007
fingers pointing at man

Trend Micro CEO in SEC probe

The Securities and Exchange Commission (SEC) is considering enforcement action against the chief executive of Trend Micro, Eva Chen, involving her husband Daniel Chiang and the trading of stock in SINA Corporation, the Chinese online media and wireless services firm. Chiang is former co-chairman of SINA Corporation. SEC …
John Leyden, 05 Jul 2006
The Register breaking news

Malware SNEAK dons cunning disguise, opens creaky back door to servers

A malicious backdoor designed to infect web servers poses a severe threat, Trend Micro warns. The malware, dubbed BKDR_JAVAWAR.JG, poses as a Java Server page but actually creates a backdoor on compromised servers. "This malware may arrive as either a file downloaded from certain malicious sites or as a file dropped by other …
John Leyden, 03 Jan 2013

Feds hunt 30-year-old alleged to be lord of Gameover botnet

The FBI has released a wanted notice for 30-year-old Russian national Evgeniy Mikhailovich Bogachev, whom they allege to be the mastermind behind both the Gameover ZeuS and the even more infamous CryptoLocker ransomware. A US indictment has been unsealed against the suspect following an FBI-led takedown operation that disrupted …
John Leyden, 03 Jun 2014
Spam

Chinese cops cuff 1,500 in fake base station spam raid

China’s police have arrested over 1,500 people on suspicion of using fake base stations to send out mobile SMS spam. The current crackdown, began in February, according to Reuters. Citing a Ministry of Public Security missive, the newswire says a group operating in north-east Liaoning province, bordering North Korea, is …
Phil Muncaster, 26 Mar 2014

Citadel botnet resurges to storm Japanese PCs

Citadel, the aggressive botnet at the heart of a widely criticised takedown by Microsoft back in June, is back and stealing banking credentials from Japanese users, according to Trend Micro. The security vendor claimed to have found “at least 9 IP addresses”, mostly located in Europe and the US, functioning as the botnet’s …
Phil Muncaster, 04 Sep 2013
The Register breaking news

Trend taps Third Brigade for security and compliance tech

Internet security firm Trend Micro has acquired security and compliance firm Third Brigade. Terms of the deal, announced Wednesday and expected to close in the second quarter of 2009, were undisclosed. Trend said the agreement to buy the privately-held firm would accelerate its dynamic datacenter security strategy. Third …
John Leyden, 29 Apr 2009
chart

Trend Micro sees resellers grow

Since launching its "Worry Free" bundle of services in late 2005, Trend Micro has seen improved interest from the channel - it has signed up 50 per cent more resellers since launch. The package is aimed at smaller businesses. It provides a bundled package and simple maintenance. It will protect servers, clients and messaging …
John Oates, 12 Jun 2006
More flaws found in Java

Java devs warned of pushbutton exploit for buggy Struts framework

Java developers were warned, but they didn't listen. Security researchers at Trend Micro report that old and vulnerable versions of the Apache Struts framework for Java are still in widespread use, and now Chinese hackers are using automated tools to exploit their flaws. The vulnerabilities in question were patched in the July …
Neil McAllister, 15 Aug 2013
Windows XP boot screen

Office, IE, Flash fixes accompany Windows XP's final Patch Tuesday

Microsoft has released patches for critical security vulnerabilities in Word and Internet Explorer on what is to be the final Patch Tuesday update for Windows XP systems. The April edition of the monthly security update contains four bulletins that address a total of 11 vulnerabilities in various Microsoft products. Two of the …
Shaun Nichols, 08 Apr 2014
TOR Logo

Malware culprit fingered in mysterious Tor traffic spike

Security researchers believe they have identified the botnet responsible for a recent spike in traffic on the anonymizing Tor network, but the exact purpose of the malware remains unclear. On Friday, security firm Fox-IT called out the culprit as a variant of a botnet sometimes known as "Mevade.A", which has been making the …
Neil McAllister, 09 Sep 2013
A hash

EBAY... You keep using that word 'ENCRYPTION' – it does not mean what you think it means

Confusion reigns over whether or not the 145 million "encrypted" user account passwords swiped from eBay can be practically cracked by crooks. A day has passed since the online tat bazaar admitted its customer database was hacked back in February, and the method of encryption is still not known. We do know what wasn't encrypted …
John Leyden, 22 May 2014

DeputyDog attack targets latest IE zero day

Security researchers have spotted two new targeted attack campaigns aimed at organisations in Japan, China and elsewhere in Asia, one of which exploits a zero day exploit in Internet Explorer revealed only last week. Operation DeputyDog is targeted at “entities in Japan”, using the IE vulnerability CVE-2013-3893 which Microsoft …
Phil Muncaster, 23 Sep 2013

Trend Micro gets slashed in attack of the killer iframes

Trend Micro, please put down your bricks and step away from the glass house. This week, researchers from the anti-virus provider uncovered at least two high-profile websites hacked so they try to infect visitors with some of the nastiest malware out there. But as they were busy pointing out the attacks on web pages belonging …
Dan Goodin, 13 Mar 2008
chalk outline of  human body at crime scene

You've got two weeks to beat off Cryptolocker, GameoverZeus nasties

The UK’s National Crime Agency has warned people have just two weeks to protect themselves against the Cryptolocker ransomware and a strain of the ZeuS password-slurping malware – before both return from the dead. The alert comes after the cops "disrupted" the systems remotely controlling the software nasties – which could mean …

Patch Tuesday: Adobe outdoes Microsoft, swats 18 bugs in latest update

Administrators and end users are being advised to update their systems following a set of Patch Tuesday releases from Microsoft and Adobe, which address more than 30 security flaws combined. Adobe said that its monthly update will include patches for its Flash, Reader, and Acrobat platforms, as well as an update for Illustrator …
Shaun Nichols, 13 May 2014

Trend Micro overhauls EMEA channel programme

Trend Micro has shaken up its EMEA channel programme in the hope of simplifying the business and forging better partner relationships in that region. The security software firm, which today announced strong Q1 results, said the newly created Affinity Partner Program should offer increased value for its partners. It aims to …
Kelly Fiveash, 26 Apr 2007
Ship in trouble

Leaky security could scuttle global ship-tracking system

Security researchers have found a major flaw in the Automatic Identification System (AIS), a mandatory tracking system for ships, which could leave the 400,000 vessels currently using it globally wide open to terrorists or pirates. Trend Micro’s Kyle Wilhoit and Marco Balduzzi and independent researcher Alessandro Pasta …
Phil Muncaster, 17 Oct 2013
The Register breaking news

Securo-boffins uncover new GLOBAL cyber-espionage operation

Government ministries, technology firms, media outlets, academic research institutions and non-governmental organisations have all fallen victim to an ongoing cyberespionage operation with tendrils all over the world, according to researchers. Infosec researchers have uncovered SafeNet in as many as 100 countries. SafeNet …
John Leyden, 20 May 2013
arrow pointing up

Trend Micro to create over 100 jobs in Cork

Security firm Trend Micro has announced it is to double the number of staff employed at its EMEA headquarters in Cork. The firm, which provides software, hardware and services to the secure content and threat management solutions sector, is to expand its Cork facility, a move it said will bring the number of staff based in its …
Deirdre McArdle, 19 Jun 2006
Evil Android

Android's defences against malicious apps dissed by security bods

Google's bold claims that Android doesn't have a malware problem and is more secure than Apple's iOS have singularly failed to convince security researchers. No less a figure than Eric Schmidt, Google's executive chairman, declared Android to be “more secure” than the iPhone, during the Gartner Symposium/ITxpo in Orlando, …
John Leyden, 21 Oct 2013
cloud

Barracuda plays the hippie card in Trend Micro patent row

Barracuda Networks has called on open source advocates to help fight its patent dust-up with Trend Micro over the Clam AntiVirus software package. Specifically, the provider of network-based security products for email and websites is asking for help in dredging up old technologies that were developed prior to the filing of the …
Dan Goodin, 29 Jan 2008
The Register breaking news

Trend Micro archive bug unearthed

Trend Micro is urging users of its anti-virus products to apply security updates following the discovery of a potentially serious security vulnerability in 29 of its products. The security bug - discovered by security researchers at ISS - involves flaws in the processing of ARJ archive files by an antivirus library that give …
John Leyden, 25 Feb 2005
thumbs down teaser 75

Trend Micro's CEO says 'AV industry sucks'

Trend Micro’s CEO threw down the gauntlet to her competitors last week, proclaiming that hackers are ahead of the game and that the anti-virus industry “sucks”. Chief exec Eva Chen, who co-founded the Tokyo, Japan headquartered-firm in 1988 with Steve Chang, announced last Wednesday a radical shift in business strategy for Trend …
Kelly Fiveash, 22 Jun 2008