Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • MMS Not the Only Attack Vector for “Stagefright”

    TrendLabs - Malware Blog
    Earlier this week Zimperium zLabs revealed an Android vulnerability which could be used to install malware on a device via a simple multimedia message. This vulnerability, now known as Stagefright, has gained a lot of attention for the potential attacks it can cause. Stagefright makes it possible, for example, for an attacker to install a spyware app […]
  • Flash Threats: Not Just In The Browser

    TrendLabs - Malware Blog
    July has been a fairly poor month for Adobe Flash Player security, to say the least. Three separate zero-day vulnerabilities (all courtesy of the Hacking Team dump) have left many people concerned about Flash security, with many (including this blog) calling for it to go away. Some sort of reaction from Adobe to improve Flash […]
  • FuTuRology: Wearables and Smart Medical Devices, Gears for a Data-Driven Healthcare Future

    TrendLabs - Malware Blog
    This is the second post in the “FuTuRology” project, a blog series where the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of popular technologies. Make sure to check the first entry of the series for a brief introduction on the project. Predicting the future sucks. It does because we are never right. […]
  • Windows 10’s New Browser Microsoft Edge: Improved, But Also New Risks

    TrendLabs - Malware Blog
    Last week we discussed how Microsoft Edge, the new browser in Windows 10, represented a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that aren’t present in older versions. Integrated plug-ins Microsoft Edge has now integrated two widely used plug-ins into the browser itself: Adobe Flash and a PDF reader. […]
  • Trend Micro Discovers Vulnerability That Renders Android Devices Silent

    TrendLabs - Malware Blog
    We have discovered a vulnerability in Android that can render a phone apparently dead – silent, unable to make calls, with a lifeless screen. This vulnerability is present from Android 4.3 (Jelly Bean) up to the current version, Android 5.1.1 (Lollipop). Combined, these versions account for more than half of Android devices in use today. No […]
  • Hacking Team Flash Attacks Spread: Compromised TV and Government Sites in Hong Kong and Taiwan Lead to PoisonIvy

    TrendLabs - Malware Blog
    A recent campaign compromised Taiwan and Hong Kong sites to deliver Flash exploits related to Hacking Team and eventually download PoisonIvy and other payloads in user systems. This campaign started on July 9, a few days after the Hacking Team announced it was hacked. The actors compromised the sites of a local television network, educational […]
  • The Russian Underground—Revamped

    TrendLabs - Malware Blog
    When big breaches happen and hundreds of millions of credit card numbers and SSNs get stolen, they resurface in other places. The underground now offers a vast landscape of shops, where criminals can buy credit cards and other things at irresistible prices. Million dollar breaches News and media coverage on significant breaches are increasingly shaping […]
  • Is Your Car Broadcasting Too Much Information?

    TrendLabs - Malware Blog
    Car hacking is a reality the general public will have to deal with. Nothing can be as intrusive and dangerous as strangers taking over your car while you are driving it. Last week, Valasek and Miller’s digital car-jacking stunt using 3G connectivity on a Jeep Cherokee’s infotainment system illustrated how life-threatening this situation can get. […]
  • Angler Exploit Kit Used to Find and Infect PoS Systems

    TrendLabs - Malware Blog
    An attack aiming to infect PoS systems was found using the Angler Exploit Kit to push a PoS reconnaissance Trojan,This Trojan, detected as TROJ_RECOLOAD.A, checks for multiple conditions in the infected system like if it is a PoS machine or part of a PoS network. It then proceeds to download specific malware depending on the […]
  • FuTuRology: A Look at Impending Threats to Popular Technologies

    TrendLabs - Malware Blog
    How do you think will the threat landscape evolve in the next two years? Three years? One of the most exciting aspects of belonging to a research group like the Trend Micro Forward-Looking Threat Research (FTR) team is practicing the intellectual exercise that is predicting the future. We can’t know what will happen but, with […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFuTuRology: A Look at Impending Threats to Popular Technologies

Market Place