Tagged: TrendLabs

Power User Group Shoutout: Free AV, Free Trend Micro Titanium Maximum Security 2012

I am avid supporter of our Power User Group. I believe I posted at menardconnect.com some of their activities on 2010 and 2011.

For 2012, they have revamped the rewards system, but I believe they will still be giving away some Free AV, Free Trend Micro Titanium Maximum Security product and other cool prizes too. But I am not after the rewards you know; this post is a testament of my all out support to the team 🙂

Quoting the Power User Group site, here are the benefits of being part of Trend Micro Power User Group this year:

  • Free license to the latest Trend Micro Home Use product after getting the following scores
    • at least 30 points – Free SN for Titanium Maximum Security 2012
    • at least 60 points – additional Free SN for Titanium Antivirus+ 2012
    • at least 90 points – additional Free SN for Titanium Maximum Security 2012
  • Be one of the first to test any latest Trend Micro Technology for Consumer-based products and tools.
  • Have a say on how we develop our products and services.
  • Win more Exciting Prizes! Top PUG 2012 Program contributors for the year will receive additional incentives.

So I encourage my readers to join the Trend Micro Power User Group. Kindly visit the Trend Micro Power User Group page:


Read the agreement and check the checkbox.
Click on the Feedback.
And Register (if you are a new member) or login (if you already have a previous account).

Hurry! Because this offer may end soon!

Lastly some disclosure:
I work at Trend Micro. This blog post is NOT a paid post by Trend Micro. The information contained in this post was taken from Trend Micro (with permission from respective teams in Trend Micro).

To know more on what I do full-time kindly visit my about page.

To read my blog’s full disclosure policy, kindly visit my disclosure page.

Will post more updates about Power User Group and Titanium Maximum Security availability when its available.

If you find this post useful, kindly add me up in Twitter and Google+. You can also like my Facebook Page too 🙂

My Post in Malware Blog: How Big will the Android Malware Threat Be in 2012?

Happy New Year to all!!!

I have many post ideas for the blog and I cannot decide which one to post first. But I guess I’ll settle with the post (or actually a repost) that is related to one of my favorite topics here at menardconnect.com and at work and that is Android and malware.

So to start the year 2012, I am re-sharing my article published on TrendLabs Malware Blog  last January 5, 2012.

How Big will the Android Malware Threat Be in 2012?
by Menard Osena (Solutions Product Manager)

In August 2011, we released our Snapshot of Android Threats, which stated that there was a significant increase in the number of Trojanized Android apps and actual malware targeting the Android platform.

In our 12 Security Predictions For 2012, we mentioned that smartphone and tablet platforms, especially Android, will suffer from more cybercriminal attacks.

In our continuous monitoring of this threat, we soon noticed that the problem was growing at an alarming rate. From a mere handful of malicious apps at the start of the year, it skyrocketed to more than a thousand malicious Android apps by the middle of December 2011. The average month-on-month growth rate for the second half of 2011 was more than 60%.

If this growth rate is sustained this year, then 2012 will definitely be an “exciting” year for Android. Why is this so? If current trends hold, we may be able to see more than 120,000 malicious Android apps by December.

There are several factors that are causing this explosive growth:

  • The increasing popularity of Android, as highlighted both by the number of total downloaded apps (more than 10 billion via the official Android Market) and the number of users and activations, as stated by Gartner and Google Senior Vice President of Mobile Andy Rubin.
  • The openness of the Android app distribution model. Unlike other mobile OSes, users are free to install applications without passing through any filtering process. This lowers the barriers to installing malicious apps considerably.
  • The cybercriminal mindset: Bad guys attack where the money is.

2011 already saw a wide variety of threats emerge for Android, as we discussed in our year in review. Android malware is definitely here to stay for 2012.

Original Post: TrendLabs Malware Blog: How Big will the Android Malware Threat Be in 2012?

Image Credit: blog.trendmicro.com
Note: With minor edits on the tags/image locations/bold fonts/etc.

Just like my previous Malware Blog article reposts, I will do my best to give additional personal insights here in Menardconnect.com soon.

For now just the repost and some shoutout and appreciation to my teammates who helped (in one way or another) me in the completion of the post.

Special thanks to Jonathan, Christian, Macky, Gelo, Dani, and Eric for their help in the article. You guys and gals really rock!!!

On Droids and Threats

TrendLabs published some cool infographic about Android and threats. And since I mentioned in my previous post that I’d do my best to write more about Android here at menardconnect.com I am featuring that infographic here.

To commemorate the first year of the discovery of the first Android trojan, TrendLabs released a blog post on A Snapshot of Android Threats. Some great highlights includes the following:

  • 1410% increase on the number of malware samples discovered by the team from January 2011 to July 2011
  • 51.9 Million Android OS-based devices in use now
  • 33% of Facebook users access the Facebook site via their mobile devices

and a lot more.

My favorite part of the infographic is about the six :). What six? In the tradition of my free six cafe world cheats, my six new Philippine money, my six free wow mounts, my six tagalog love quotes and my free six video posts, I am listing the six types of Android malware according to TrendLabs:

  1. Data Stealer
  2. Premium Service Abuser
  3. Click Fraudster
  4. Malicious Downloader
  5. Spying Tools
  6. Rooter

Image Credit: blog.trendmicro.com

To know more about the Android threats and the infographic kindly visit Batangastoday.com and Trend Micro Malware Blog.

Before I end this post, some disclosure:

I work at Trend Micro. The post I have here in menardconnect.com are my own personal views and does not reflect the views and stand of my employer.

To know more about me, kindly visit my about page. To know about this blog’s disclosure policy kindly visit my disclosure page.

Hope you like my Android blog post 🙂

On TrendLabs, Security and Social Media

I did some internal presentation for TrendLabs folks this afternoon on security and social media stuff. I cannot share details yet as not all sessions are done (still got 3 2 to go), but to give you a hint it’s related to my previous post here and in Malware Blog.

At the end of the presentation I mentioned that I also blog here at Menardconnect.com and since some of them might check the internet for this site, hence this post.

Yup TrendLabs dudes and dudettes, welcome to my blog. It’s not ALL tech, antivirus and security blog posts here, as I also blog about games, food and other random *woot* things. Kindly read my about page if you are still in doubt (if this is my blog) 🙂

Thank you to those who attended the first session and second sessions. I have to admit I still got some preso jitters (for the first session). Not sure if I’m just nervous or excited or maybe both 🙂

I plan update this post after each session, and will do another follow up post after all the sessions are done.

To my other readers (especially non-Trenders) sorry but the presentation is for internal TrendLabs folks for now.

Presentation for external? I’m not making any promises (my idea here is like the song lyrics “…I’m not making plans for tomorrow, For tomorrow never comes“).

But who knows?

Image Credit: about-threats.trendmicro.com

Update 2011.05.04
2nd session done. This session was more relaxed 🙂 maybe there is no additional “external” pressure 🙂 Thanks guys n gals for attending.

Vote for TrendLabs Malware Blog in SC Magazine’s Best Corporate Security Blog

I just recently learned that our TrendLabs Malware Blog was nominated in SC Magazine’s Annual Social Media Awards.

I love the TrendLabs Malware Blog and I post some articles there every now and then. This post is a shout out to my friends and readers to help me and the TrendLabs Team make our Malware Blog the top blog.

Kindly vote for TrendLabs Malware Blog for SC Magazine’s Annual Social Media Awards in Best Corporate Security Blog category.

Here’s how:
1. Kindly go to SC Magazine US Site
2. Look for the Second Annual SC Social Media Awards Voting Poll
3. Choose TrendLabs Malware Blog (Trend Micro) from the list in “best corporate security blog”

4. Click Vote

Feel free to vote for your other favorite security bloggers and security tweeps in the next 2 polls.

Voting will end on Friday Feb 11th 8PM (EST) that’s Saturday, Feb 12th 9AM (GMT+8).

Thank you in advance!!!

Good luck to TrendLabs Malware Blog!!!

Trend Micro Titanium, Sodexho Pass and Special Gift Packs Awaits

Do you want some free Trend Micro Titanium Maximum Security antivirus software?

How about if we add some Sodexho Pass worth P500?

Ok let’s increase the wager and add some Trend Micro Gift Pack (includes Trend Micro Shirt, Trend Micro 2011 Calendar and other TM freebies)?

If your answer is a big YES to all, then you are lucky. Read the details below:

Trend Micro will be having Power User Group event this coming weekend (February 12 and 13, 2011). My teammates are looking for laptop users who are willing to be part of Trend Micro’s standard product development process. In this event, my teammates will ask you to install Trend Micro Titanium 3.1 antivirus software in your laptop (minimum requirement is Windows 7 OS installed) and answer a set of questionnaire. My teammates will also be present at the event venue to support and assist you if you will have problems related to the product (installation n stuff).(note: I’d love to join you guys n gals in this event, but i’m not free that day. I’ll post my reason here soon I’m out for the RSA 2011 conference)

Below are the event details of the Trend Micro Titanium Intensive Beta Testing

TrendLabs Philippines
9th Floor | Tower 2, The Rockwell Business Center Ortigas Avenue, Pasig City (Beside The Medical City).

Session 1
February 12, 2011
Saturday, 1:00 P.M. to 5:00 P.M

Session 2
February 13, 2011
Sunday, 1:00 P.M. to 5:00 P.M

Note: Snacks will be served during the event

To qualify for the program, users must bring in their personal laptops running Windows 7 and IE 9.0 on the event day and install Trend Micro Titanium Maximum Security 3.1.
If you meet the minimum requirements, just follow the steps below to join.

  1. Subscribe to my RSS Feed OR my email Feed
  2. Fill Up the Zoomerang Survey or click the click here image below
  3. Kindly put my name, Menard Osena or Menardconnect.com to the field = “Who referred you to this testing”
  4. After signing up, you will receive a confirmation email from the Trend Micro Beta Team if you are qualified to participate.

Reminders: The slots are limited, so hurry, grab this opportunity and join now!

Registration closes on February 10, 2011, 12 noon.

Feel free to forward this blog post to your friends, family members or relatives to share this opportunity with them. If you have Facebook/Twitter/Plurk/etc, feel free to share/tweet/plurk this blog post too so that others can know about it.

Lastly, some disclaimer:
I’m an employee of Trend Micro. This blog post is _NOT_ a paid post by Trend Micro. The information contained in this blog post is taken from Trend Micro Beta Team (with permission to repost in my blog). To know more on what I do full-time kindly visit my about page. To read this blog’s disclosure policy in detail, kindly visit my disclosure page.

Image Credits: Trend Micro Beta Team

FakeAV and the AV Security Suite Removal

FakeAV, Rogue AV, Rogue Antivirus, Fake Antivirus, Rogue Security Software, Scareware.

Different Security Vendors call them by different names. Simply put, these FAKEAV’s are malicious programs and software packages that mislead users by mimicking legitimate antivirus (AV) programs and giving false warnings (that the machine/ PC that they are using are infected by malware, viruses, spyware and lots of other bad stuffs).

AV Security Suite Image courtesy of Trend Micro Threat Encyclopedia and TrendLabs Malware Blog

And after running the supposedly antivirus scan, FakeAV offers some protective and removal solution if you buy and install their product. Beware: take note that this supposedly antivirus product will do more damage than good since it will do a lot of bad stuffs: it may download and install other malware or steal confidential information from your machine. FakeAV software package price ranges from 40 US dollars and above. And yes, definitely this is a lucrative moneymaking scheme for the bad guys. Read more in Trend Micro Report (PDF): The Business of Cybercrime: A complex business model

So what are my personal tips and suggestions for this Fake AV? How do I suggest dealing with this AV Security Suite Removal?

One good resource that I recommend is scanning your machine with Trend Micro HouseCall. This tool is Trend Micro’s free online malware scanner and cleaner and the new version (HouseCall 7) uses the Trend Micro Smart Protection Network technology that is both powerful and lightweight. If you are a techie-type of person you can try out other free tools like Hijackthis.

Ideally prevention is better than cure. So having a good antivirus/anti-malware/security product on your desktop is a basic and keeping it up to date is a must. Update it daily (at least) as there are tons of new malware coming out every day (read my old Malware Blog post on 1H 2009: Malware Threat Grows Ever Larger). Some personal suggestions is of course Trend Micro Internet Security Pro (PC-Cillin) or Trend Micro Titanium (cut and paste the links to your browser)


But there are also a lot of other good, trustworthy and legitimate AV and Security products out there  (I will not list them all since I worry that I might miss some AV/AV products and my AV’er friend/s from that company might get mad at me (in Filipino: baka magkaselosan lang sila) so stick with TM products only 🙂 )

It is also wise to make sure that your operating system (OS) and other critical programs are patched with the latest updates.

Awareness is the key. Be aware of the programs that you are installing and running in your machine. Trust only those legitimate software. If suddenly an unknown program tells you that your machine is infected with some malware: DO NOT PANIC. Check first if the notification came from your legitimate Antivirus/Anti-malware/Security product installed. If not then be paranoid and double-check by running a scan from your AV product. Check also if the product is similar to the known FakeAV/Rogue Antivirus program names (and do not trust them right away). Partial list of FakeAV as compiled by Wikipedia.

Advanced Cleaner, AKM Antivirus 2010 Pro, AlfaCleaner, Alpha AntiVirus, ANG Antivirus (knock-off of AVG Anti-virus), Antimalware Doctor, AntiSpyCheck 2.1, AntiSpyStorm, AntiSpyware 2009, Antispyware 2010, AntiSpyware Soft, Antivirus 7, Antivirus Soft, Antivirus Suite, Antivirus System PRO, AntiSpyware Bot from 2Squared Software, AntiSpywareExpert, AntiSpywareMaster, AntiSpywareSuite, AntiSpyware Shield, Antivermins, Antivirus 2008, Antivirus 2009, Antivirus XP 2010, Antivirus 2010 (also known as Anti-virus-1), Antivirus 360, Antivirus Pro 2009, AntiVirus Gold, Antivirus Live, Antivirus Master, Antivirus XP 2008, Antivirus Pro 2010, AV Security Suite, Avatod Antispyware 8.0, Awola, BestsellerAntivirus, ByteDefender also known as ByteDefender Security 2010, Cleanator, ContraVirus, Control Center, Cyber Security, Data Protection, Desktop Security 2010, Doctor Antivirus, Doctor Antivirus 2008, DriveCleaner, Dr Guard, EasySpywareCleaner, eco AntiVirus, Errorsafe, ErrorSmart, Flu Shot 4, Green Antivirus 2009, IE Antivirus (aka IE Antivirus 3.2), IEDefender, InfeStop, Internet Antivirus, Internet Antivirus Pro, Internet Security 2010, KVMSecure, Live PC Care, Live Security Suite, MacSweeper, MalwareCrush, MalwareCore, MalwareAlarm, Malware Bell (a.k.a. Malware Bell 3.2), Malware Defender (not to be confused with the HIPS firewall of the same name), Malware Defense, MS Antivirus (not to be confused with Microsoft Antivirus or Microsoft Security Essentials), MS AntiSpyware 2009 (not to be confused with Microsoft AntiSpyware, now Windows Defender), MaxAntiSpy, My Security Wall, My Security Engine, MxOne Antivirus, Netcom3 Cleaner, Paladin Antivirus, PCSecureSystem, PC Antispy, PC AntiSpyWare 2010, PC Clean Pro, PC Privacy Cleaner, PerfectCleaner, Perfect Defender 2009, PersonalAntiSpy Free, Personal Antivirus, Personal Security, PAL Spyware Remover, PCPrivacy Tools, PC Antispyware, Protection Center, PSGuard, Privacy Center, Rapid AntiVirus, Real AntiVirus,
Registry Great, Safety Alerter 2006, Safety Center, SafetyKeeper, SaliarAR, SecureFighter, SecurePCCleaner, SecureVeteran, Security Master AV, Security Scan 2009, Security Tool, Security Toolbar 7.1, SiteAdware, Security Essentials 2010 (not to be confused with Microsoft Security Essentials), Smart Antivirus 2009, Soft Soldier, SpyAxe, Spy Away, SpyCrush, Spydawn, SpyGuarder, SpyHeal (a.k.a SpyHeals & VirusHeal), SpyMarshal, Spylocked, SpySheriff (a.k.a PestTrap, BraveSentry, SpyTrooper), SpySpotter, SpywareBot (Spybot – Search & Destroy knockoff, Now known as SpywareSTOP), Spyware Cleaner[135] SpywareGuard 2008 (not to be confused with SpywareGuard by Javacool Software), Spyware Protect 2009, SpywareQuake …

Important Note: This is partial list only. And these product names are just names in the UI (User Interface). FakeAV Developers can update this anytime by adding the year (and year next year) as what Legit AV products do. They can also add the usual legit product suffixes like Pro and Security Suite. Bottom line: use the name list with caution OK?

Original list taken from wikipedia


I hope you find my FakeAV and AV Security Suite Removal post useful. I’m glad finally I finished one as I have been contemplating on writing a post on this topic since 2009. To know more about FakeAV, I recommend reading the TrendLabs Malware Blog


Lastly some background info on me, my blog and some disclosure:
This blog is my personal blog and I discuss my personal views on Technology and IT/ Security here at menardconnect.com. This post is _NOT_ a paid post by Trend Micro but I disclose that I’m employed with Trend Micro. Read more on my about page and my disclosure page.

From Eastwood City to Rockwell Business Center

I’ve been itching to write something about this topic but I don’t know where and how to start. Will the post be senti-mode one (remembering all the good old memories from year 2000?) or will it be a rant post 🙂 ? Nah! Lets try it the Starcraft and foodie-goodie way post!

Yes its official! TrendLabs is moving from Eastwood City CyberPark to Rockwell Business Center. I’m not the official spokesperson on this topic but since I am seeing some discussions on social networking sites I guess it’s a not a secret anymore hence this post. Some of my teammates did a zergling rush and zealot rush last week and have already established a base camp there. I don’t know if they have built enough pylons already (to power up the servers y’ know). But for me I will be moving there in the next couple of weeks, probably when there are lots of “Carrier has arrived” and “Warp fields stabilized!” ready. I like to join the battle for the end game! Hehehe 🙂

One of the things I love about Eastwood is the food, so in the tradition of my tagalog love quotes, six social city cheats, my six hotel city cheats, my six cafe world cheats, my free six video posts I am sharing six pictures of my favorite food stuffs found in Eastwood City:

First is Momo’s Frozen Iced Tea

I love the guava and peach flavored ones. It goes well with any of the Momo Desserts

Next will be Momo’s squid calamari

How about some pizza from Pasto? The one below is the Bianca and Di Carne pizza that we had last time.

Or some Genovese Pasta, again from Pasto

On the local pinoy food how about some Halo Halo from Mang Inasal?

Yummy! I will post some pics (if I can find some more in my PC and phone) and post more updates too soon!

Moscow Subway Explosion leaves 37 dead and hundreds injured

It was reported that female suicide bombers attacked Moscow Subway during the rush hour Monday morning, March 29, 2010.

The first explosion occurred about at Lubyanka subway station near Central Moscow while a second explosion rocked the Park Kultury station some 30 to 45 minutes later. The Lubyanka station is near the Kremlin and is the station nearest to the office of the Federal Security Service (FSB) Russia’s intelligence service agency.

As of 7PM (GMT+8) the Moscow subway explosion death toll is now at 37, while the injured figures rose to 102, as per report of Yahoo News.
Russian officials theorized that the Moscow Subway Explosion was done by Chechen separatists, who have been waging a long internal struggle for independence from Russia.

Inquirer.net reported that a Filipina, Maria Aileen Ponting, was among those injured. The Philippines Department of Foreign Affairs (DFA) announced that Ponting is safe as her injuries are not life threatening. DFA staffs are providing her needed assistance as per the statement released by the DFA.

Update 03.29.2010 10PM (GMT+8)

On the technology side of things, TrendLabs folks are seeing some incident wherein bad guys are utilizing this moscow bombing issue for their own nefarious deeds. I will post details here as soon as it is available.

Update 03.30.2010 11AM (GMT+8)

Trend Micro Malware Blog reports that searches related to Moscow Bombing and Moscow Subway Explosion may lead to some links related to FAKEAV. Read Search for News on Moscow Subway Explosions result to FakeAV

St. Patrick’s Day at Arlington Office

This is my first time to celebrate St. Patrick’s Day. Just like last year when I had my first Cinco de Mayo celebration, I’m here again with our US AV Team and this time it’s for St. Patrick’s Day. Some of my office-mates wore something green; a manager from our sales team even dressed himself as a leprechaun! Cool!!!

They decorated our pantry and they served cool shamrock shaped cookies:

And some sweet green cupcakes

And some some choco cupcakes too

Even if my sked was a little bit tight, I tried to enjoy the day and it was a fun experience. Here is my St. Patrick goody:

We had a great day here at Arlington office 🙂