Brought to you by TrendLabs, Trend Micro's global threat research & support organization
Trend Micro—Securing Your Journey to the Cloud Follow us on Twitter Like us on Facebook Watch our YouTube Channel
FIRST LINE OF DEFENSE—YOUR REGULAR SOURCE OF SECURITY UPDATES FROM TRENDLABS

> WEEKLY SPOTLIGHT

How to Get Rid of OBAD Malware

 

Cybercriminals have come up with Android malware that not only evade detection but also removal through conventional means. OBAD is one of these.
Read on »

> THREATS OF THE WEEK

 

LATEST SECURITY ADVISORIES    LATEST MALWARE    LATEST MALICIOUS URLs


> LATEST NEWS

Oracle Is Improving Java Security


Java has had a long history of vulnerabilities. Just this year, cybercriminals used Java zero-days to exploit newfound vulnerabilities as part of targeted attacks against government organizations and institutions.
Read on »

> QUOTE OF THE WEEK

"

OBAD abuses administrator privileges in two ways—it performs malicious routines and evades detection and removal.

"

> OTHER NEWS

South Korean Government DNS Servers Targeted by DDoS Attacks

Compromised Auto-Update Mechanism Affects South Korean Users

Scam Sites Now Selling Instagram Followers

Our investigation of the June 25 South Korea incident led us to the compromise of an auto-update mechanism attack scenario. As part of our continuous monitoring, we documented another scenario (presented in this blog entry) pertaining to a DDoS attack launched against specific sites.
Read on »

On Tuesday, South Korea raised the country's cybersecurity alarm from level 1 to 3 because of several incidents that affected different government and news websites. One of the several attacks related to the June 25 security incident involved the compromise of the auto-update mechanism related to the legitimate installer file, SimDisk.exe, which we were able to get a sample of. SimDisk is a file-sharing and storage service.
Read on »

Another scam site is offering to increase a user's number of Instagram followers. Unlike previous attacks, however, these sites require payment, depending on how many followers you prefer.
Read on »

FLOD is getting a makeover
 

QUICK LINKS

SECURITY RESOURCES

> View this issue online
> Subscribe to First Line of Defense

> New Report: The Android OS Fragmentation
   Problem
>
New Research Paper: Windows 8 and Windows
   RT: New Beginnings

 
 
 

We appreciate your interest in the Trend Micro First Line of Defense Newsletter. If you would like to receive future Trend Micro product announcements and special offers, please opt in to our mailing list.


Copyright ©2013 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. The information contained in this document is subject to change without prior notice.