Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • Risky Links: Layers and Protocols of Internet of Everything Devices

    TrendLabs - Malware Blog
    We see the ‘cool’ when we wear or operate our smart TVs and watches and all other smart devices we own. But are we aware of how the data is processed in these devices? And where does the data we get or the data that these devices transmit end up? Most, if not all, smart […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRisky Links: Layers and Protocols of Internet of Everything Devices
  • Addressing Mobile Device Management Security Concerns

    TrendLabs - Malware Blog
    The introduction of personal devices (or Bring Your Own Device) into the workplace brings about issues about control and data protection. BYOD has not only blurred the lines between corporate and personal data but it has also ushered in risks, such as lost or stolen devices or data breaches via employee-owned devices. Enter mobile device […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAddressing Mobile Device Management Security Concerns
  • The Prevalence of Crypto-Ransomware

    TrendLabs - Malware Blog
    Cryptolocker, a refinement of Ransomware with file-encryption capabilities emerged in the wild last October 2013. It continuously evolves as seen in the inclusion of new tactics and methods to avoid early detection and convinces unsuspecting users to pay the ‘ransom’ to get their files back. Cryptographic Locker Ransomware We recently spotted a ransomware variant that claims to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Prevalence of Crypto-Ransomware
  • Android Malware Use SSL for Evasion

    TrendLabs - Malware Blog
    Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), are designed to provide a secure, encrypted connection between a client and a server online. For further authentication and encryption, the server is required to provide certificates. By doing so, the server can prove its identity directly and effectively. With an SSL connection, both […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAndroid Malware Use SSL for Evasion
  • AppLock Vulnerability Leaves Configuration Files Open for Exploit

    TrendLabs - Malware Blog
    We have previously discussed about certain file locker apps that fail to hide files properly. We recently came across yet another file locker app, AppLock, which has the same issue. However, the vulnerability concerning this app goes beyond improperly hiding files—the vulnerability can allow other apps to manipulate the app’s configuration files. The configuration files include […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAppLock Vulnerability Leaves Configuration Files Open for Exploit
  • 64-bit Version of MIRAS Used in Targeted Attack

    TrendLabs - Malware Blog
    We have been investigating the MIRAS malware family, which was recently linked to attacks that targeted a Europe-based IT company. Our analysis shows that MIRAS, or BKDR64_MIRAS.B is a 64-bit malware that was used for the data exfiltration stage in a targeted attack. MIRAS is available in 32-bit (BKDR_MIRAS.B) and 64-bit (BKDR64_MIRAS.B) Windows operating systems. An analysis of BKDR64_MIRAS.B To serve […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro64-bit Version of MIRAS Used in Targeted Attack
  • The Easy-to-Miss Basics of Network Defense

    TrendLabs - Malware Blog
    Last month we released a paper on backdoor techniques which highlighted the importance of setting up your network properly to detect and block C&C communication. In this post, I will share some rules that IT administrators can proactively implement in order to set up “basic defense” for their network. I say basic here because these rules are not […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Easy-to-Miss Basics of Network Defense
  • 2014 – An Explosion of Data Breaches and PoS RAM Scrapers

    TrendLabs - Malware Blog
    The computer security industry will always remember 2013 as the year the U.S. suffered one of the largest data breaches in history. In a targeted attack, U.S. retailer Target was compromised during the Christmas shopping season using the BlackPOS malware, a PoS RAM scraper family. According to estimates, cybercriminals stole 40 million credit and debit card numbers as well […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro2014 – An Explosion of Data Breaches and PoS RAM Scrapers
  • Uncovering Malicious Browser Extensions in Chrome Web Store

    TrendLabs - Malware Blog
    Months ago, Google published a blog post informing users of Google Chrome that they cannot install browser extensions from third parties. The reason: security. By only permitting extensions from official Chrome Web Store, Google claims they would be able to police these extensions in order to prevent malicious ones. Unfortunately, such tactics aren’t enough to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroUncovering Malicious Browser Extensions in Chrome Web Store
  • September 2014 Patch Tuesday Includes Fixes for Critical IE Vulnerabilities

    TrendLabs - Malware Blog
    For this month’s patch Tuesday, Microsoft released four security bulletins, addressing flaws found in Internet Explorer, Microsoft .NET Framework, Microsoft Windows, and Microsoft Lync server.  One bulletin is rated as ‘Critical’ while the rest are tagged as ‘Important’. One of the notable bulletins in this month’s cycle is MS14-052, which addresses thirty-six vulnerabilities found in […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSeptember 2014 Patch Tuesday Includes Fixes for Critical IE Vulnerabilities

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place