OCTOBER 18, 2013
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Popularity Begets Phishing: Multiple Attacks Spotted

Security for Home Users
Why Macs Need Security

Security for Business
Consumer App Risks and Benefits



Security Spotlight

Popularity Begets Phishing: Multiple Attacks Spotted

The information you share like your name, address, and email address can be collected, sold, or used for malicious schemes.”



News outlets aren’t the only ones keeping tabs on the popular. Cybercriminals are using talked-about brands and events to launch phishing attacks against you too. A successful attack could mean having your accounts, money, and identity stolen.

Attack on the Popular

Facebook Mobile continues to draw in big numbers with around 819 million active users worldwide. It’s no surprise then that bad guys created a phishing page resembling the official Facebook Mobile page to steal both your Facebook credentials and credit card details.

Apple®, 2013’s “most valuable brand,” was also used in phishing attacks. In fact, we noticed a spike in the number of Apple phishing sites, particularly during months of rumored product launches. These sites ask for information like email addresses and credentials like Apple IDs. Cybercriminals can use your Apple ID to purchase movies and apps, manage your connected devices, and control your data in iCloud.

Scams and Spam

Cybercriminals have also taken advantage of the controversy surrounding the Affordable Care Act or “Obamacare” to send out themed spam. Using words like “medicare,” “enrollment,” and “medical insurance” in the message body, cybercriminals enticed you to click embedded links leading to survey scams. The sites, designed to look like real survey pages, ask you to give out personal information in exchange for prizes like Apple products. The information you share like your name, address, and email address can be collected, sold, or used for malicious schemes.

To protect against such schemes, don’t click links or open emails from senders you don’t know. For urgent matters like insurance registration, visit official sites rather than click links in emails. Bookmark sites you frequently visit too to avoid landing on malicious pages. Some sites will try to convince you to share personal information in exchange for prizes. Just remember: if it’s too good to be true, it probably is.

Copyright ©2013 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: