Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘CTO Insights’ Category




    The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking "does privacy still exist?", cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things, but boring was not one of them. So, what do we have to look forward to in 2014 and beyond? We expect mobile malware to not just ...

    Posted in CTO Insights | Comments Off



    Check out the TrendLabs 2Q 2013 Security Roundup. Threats on mobile platforms, devices, and applications have been swelling up over the past years; but this quarter, they have finally gone full throttle. Cybercriminals have found more sophisticated ways to bypass mobile security, and it’s not just through malicious applications anymore. Android Updates Lag, Users Suffer Critical Flaws Proof of the Android “Master Key” vulnerability rose with the discovery that cybercriminals can exploit the flaw to update original apps with malicious ones. The multicomponent ...

    Posted in Bad Sites, CTO Insights, Malware, Mobile, Vulnerabilities | Comments Off



    At the end of May, two Google security engineers announced Mountain View's new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, but they also indicated that researchers should release the details themselves if the vendor was not forthcoming. This is a pretty aggressive goal. Microsoft, for example, ...




    Last month, an article in Dark Reading by Robert Lemos asked if it was "Time To Dump Antivirus As Endpoint Protection?". It referenced a recent Google research paper that outlined their new reputation technology called CAMP (short for Content-Agnostic Malware Protection), which they claim protects against 98.6% of malware downloaded via their Chrome browser, as opposed to the 25 percent detected by the best performing antivirus engine they tested. This may sound like magic. Whether you view this as white magic ...

    Posted in Bad Sites, CTO Insights, Malware | Comments Off



    As the year draws to a close it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. Here are some of my predictions: The volume of malicious and high-risk Android apps will hit 1 million in 2013. As Android grows, so does the threat of malicious and high risk apps for its users. In 2013, we will be able to detect ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice