Data breaches are in the news all the time these days. Whether it’s the loss of credit and debit card information from a retailer like Target or personal and health care information from a health insurance company like Premera Blue Cross, there’s a steady drumbeat of stories about data being lost to attackers. But the…Read More
Could you have imagined five years ago that the car you’re driving would have greater computing power than the Apollo 11 that landed on the moon? And could you have imagined that those same cars would be manufactured with state-of-the-art roll bars, airbags and anti-lock brakes to prevent accident and injury, but not sufficient cyber…Read More
On Wednesday, Adobe released a new version of Flash on Wednesday to address the zero-day vulnerability that was disclosed as part of the Hacking Team attack last weekend. Unfortunately, our researchers overnight have found another, new unpatched vulnerability affecting Adobe Flash that is a result of the Hacking Team attack. Our researchers have notified Adobe…Read More
There has been a lot of discussion in the past few days about the successful attack against the Hacking Team in Italy and the release of their data as a result of that attack. The most important thing that people need to be aware of is that this attack has resulted in the public disclosure…Read More
Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at the latest zero-day exploit affecting all versions of Adobe Flash Player. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. Please add your thoughts in…Read More
Restaurant technology is now becoming increasingly advanced, not only to address security issues, but to better meet customer needs as well.
A fatal plane crash occurred due to data loss. Is this a sign of cyber incidents to come?
Ransomware is a growing threat. It is another underhanded method that cyber criminals use to try to separate you from your money. Typically, ransomware is malicious software that either locks up your computer so you can’t use it or encrypts your documents and files on it so you can’t access them. In some cases ransomware…Read More
Our nation’s critical infrastructure is an arena where security is absolutely imperative.
Jason Geffner, a security researcher at Crowdstrike, has released information about a new, unchecked buffer vulnerability called VENOM affecting the open source QEMU virtualization platform which provides virtualization capabilities similar to VMWare or Microsoft’s Hyper-V. The initial reports indicate this is a serious vulnerability, and while the vulnerability itself is serious, the overall scope is…Read More