Corporate Partners

Top IT Security Bloggers

  • Feds Arrest Alleged ‘Silk Road 2′ Admin, Seize Servers

    Krebs on Security
    Federal prosecutors in New York today announced the arrest and charging of a San Francisco man they say ran the online drug bazaar and black market known as Silk Road 2.0. In conjunction with the arrest, U.S. and European authorities have jointly seized control over the servers that hosted Silk Road 2.0 marketplace.
  • Top Ranking for Trend Micro Mobile Security for Android on Security App Test

    Trend Micro - Cloud Security Blog
    AV-TEST.org recently evaluated 32 security apps from different providers for their protection function, usability and battery strain. We’re proud to report that Trend Micro™ Mobile Security for Android achieved top ranking  – out-scoring 19 other apps, including those provided by Kaspersky, McAfee, and Symantec. Our Mobile Security for Android had to defend against more than 220...
  • 3 ways to make your Yahoo Mail account safer

    Sophos - Naked Security
    Following on from our detailed guide to securing your webmail, here's a quick breakdown of how to make the most important fixes, for users of Yahoo Mail.
  • STD dating site PositiveSingles.com faces $16.5 million fine for sharing user profiles

    Sophos - Naked Security
    The dating site for people with STDs promised "100%" anonymity but used the anonymous claimant's profile on affiliated niche dating sites such as AIDSDate, Herpesinmouth, ChristianSafeHaven, MeetBlackPOZ and PositivelyKinky.
  • Root Cause Analysis of CVE-2014-1772 – An Internet Explorer Use After Free Vulnerability

    TrendLabs - Malware Blog
    We see many kinds of vulnerabilities on a regular basis. These range from user-after-free (UAF) vulnerabilities, to type confusion, to buffer overflows, to cross-site scripting (XSS) attacks. It’s rather interesting to understand the root cause of each of these vulnerability types, so we looked at the root cause of an Internet Explorer vulnerability - CVE-2014-1772. We’d […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRoot Cause Analysis of CVE-2014-1772 – An Internet Explorer Use After Free Vulnerability
  • Root Cause Analysis of CVE-2014-1772 – An Internet Explorer Use After Free Vulnerability

    Trend Micro - Security Intelligence
    We see many kinds of vulnerabilities on a regular basis. These range from user-after-free (UAF) vulnerabilities, to type confusion, to buffer overflows, to cross-site scripting (XSS) attacks. It’s rather interesting to understand the root cause of each of these vulnerability types, so we looked at the root cause of an Internet Explorer vulnerability - CVE-2014-1772. We’d […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRoot Cause Analysis of CVE-2014-1772 – An Internet Explorer Use After Free Vulnerability
  • “Operation Huyao” Shows New, More, Effective Phishing Technique

    Trend Micro - Cloud Security Blog
    Cybercriminals are just like professional software developers: they’re always looking to “improve” their “products” to be better, cheaper, and more effective. Trend Micro’s threat researchers have recently uncovered the latest way that attackers are “improving” phishing attacks. Our researchers have recently uncovered a new phishing campaign targeting users of an online store in Japan. What...
  • Still Spamming After All These Years

    Krebs on Security
    A long trail of spam, dodgy domains and hijacked Internet addresses leads back to a 37-year-old junk email purveyor in San Diego who was the first alleged spammer to have been criminally prosecuted 13 years ago for blasting unsolicited commercial email.
  • Banking Trojan DRIDEX Uses Macros for Infection

    TrendLabs - Malware Blog
    Included in our predictions for the upcoming year is that more severe online banking and other financially-motivated threats will arise. It seems that we didn’t have to wait for 2015 to see proof of this prediction. We recently came across banking malware that features new techniques to cast a wider net for victims and avoid […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBanking Trojan DRIDEX Uses Macros for Infection
  • Banking Trojan DRIDEX Uses Macros for Infection

    Trend Micro - Security Intelligence
    Included in our predictions for the upcoming year is that more severe online banking and other financially-motivated threats will arise. It seems that we didn’t have to wait for 2015 to see proof of this prediction. We recently came across banking malware that features new techniques to cast a wider net for victims and avoid […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBanking Trojan DRIDEX Uses Macros for Infection

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place