Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    September 2014
    S M T W T F S
    « Aug    
     123456
    78910111213
    14151617181920
    21222324252627
    282930  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘CTO Insights’ Category




    It is an interesting time to be in IT security today. PRISM and Edward Snowden taught many lessons about how companies should secure their data. There's been a lot of discussion about the surveillance aspect of this, but consider this whole affair from the side of the NSA. To the NSA, this was a data breach of unprecedented proportions. All indications are that Snowden was able to exfiltrate a significant amount of classified data; what has been published so far represents ...

    Posted in CTO Insights, Targeted Attacks | Comments Off



    There is no doubt that mobile banking is going to become very significant in 2014, if it isn't already. In the United States, a quarter of all people selecting a bank say mobile banking is a "must-have". In parts of the developing world, mobile banking is even the dominant form of banking. There is no doubt anymore that mobile banking is a big part of the banking landscape - which means, of course, that it is bound to become a big ...

    Posted in CTO Insights, Mobile | Comments Off



    The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking "does privacy still exist?", cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things, but boring was not one of them. So, what do we have to look forward to in 2014 and beyond? We expect mobile malware to not just ...

    Posted in CTO Insights | Comments Off



    Check out the TrendLabs 2Q 2013 Security Roundup. Threats on mobile platforms, devices, and applications have been swelling up over the past years; but this quarter, they have finally gone full throttle. Cybercriminals have found more sophisticated ways to bypass mobile security, and it’s not just through malicious applications anymore. Android Updates Lag, Users Suffer Critical Flaws Proof of the Android “Master Key” vulnerability rose with the discovery that cybercriminals can exploit the flaw to update original apps with malicious ones. The multicomponent ...

    Posted in Bad Sites, CTO Insights, Malware, Mobile, Vulnerabilities | Comments Off



    At the end of May, two Google security engineers announced Mountain View's new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, but they also indicated that researchers should release the details themselves if the vendor was not forthcoming. This is a pretty aggressive goal. Microsoft, for example, ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice