Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    August 2014
    S M T W T F S
    « Jul    
     12
    3456789
    10111213141516
    17181920212223
    24252627282930
    31  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘CTO Insights’ Category




    There is no doubt that mobile banking is going to become very significant in 2014, if it isn't already. In the United States, a quarter of all people selecting a bank say mobile banking is a "must-have". In parts of the developing world, mobile banking is even the dominant form of banking. There is no doubt anymore that mobile banking is a big part of the banking landscape - which means, of course, that it is bound to become a big ...

    Posted in CTO Insights, Mobile | Comments Off



    The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking "does privacy still exist?", cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things, but boring was not one of them. So, what do we have to look forward to in 2014 and beyond? We expect mobile malware to not just ...

    Posted in CTO Insights | Comments Off



    Check out the TrendLabs 2Q 2013 Security Roundup. Threats on mobile platforms, devices, and applications have been swelling up over the past years; but this quarter, they have finally gone full throttle. Cybercriminals have found more sophisticated ways to bypass mobile security, and it’s not just through malicious applications anymore. Android Updates Lag, Users Suffer Critical Flaws Proof of the Android “Master Key” vulnerability rose with the discovery that cybercriminals can exploit the flaw to update original apps with malicious ones. The multicomponent ...

    Posted in Bad Sites, CTO Insights, Malware, Mobile, Vulnerabilities | Comments Off



    At the end of May, two Google security engineers announced Mountain View's new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, but they also indicated that researchers should release the details themselves if the vendor was not forthcoming. This is a pretty aggressive goal. Microsoft, for example, ...




    Last month, an article in Dark Reading by Robert Lemos asked if it was "Time To Dump Antivirus As Endpoint Protection?". It referenced a recent Google research paper that outlined their new reputation technology called CAMP (short for Content-Agnostic Malware Protection), which they claim protects against 98.6% of malware downloaded via their Chrome browser, as opposed to the 25 percent detected by the best performing antivirus engine they tested. This may sound like magic. Whether you view this as white magic ...

    Posted in Bad Sites, CTO Insights, Malware | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice