Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    October 2014
    S M T W T F S
    « Sep    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘CTO Insights’ Category




    At the end of May, two Google security engineers announced Mountain View's new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, but they also indicated that researchers should release the details themselves if the vendor was not forthcoming. This is a pretty aggressive goal. Microsoft, for example, ...




    Last month, an article in Dark Reading by Robert Lemos asked if it was "Time To Dump Antivirus As Endpoint Protection?". It referenced a recent Google research paper that outlined their new reputation technology called CAMP (short for Content-Agnostic Malware Protection), which they claim protects against 98.6% of malware downloaded via their Chrome browser, as opposed to the 25 percent detected by the best performing antivirus engine they tested. This may sound like magic. Whether you view this as white magic ...

    Posted in Bad Sites, CTO Insights, Malware | Comments Off



    As the year draws to a close it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. Here are some of my predictions: The volume of malicious and high-risk Android apps will hit 1 million in 2013. As Android grows, so does the threat of malicious and high risk apps for its users. In 2013, we will be able to detect ...




    We know that threat actors take time to study the network environments of their prey. As employees go more and more mobile, the emergence of mobile malware in targeted attacks seems to be a logical progression. For the past few months, however, this notion has been all speculation—and we wondered, not if, but when it will happen. Today, we can say for sure: it has. At DEFCON, we presented for the first time that file infector viruses could be written on Android ...

    Posted in Bad Sites, CTO Insights, Mobile, Targeted Attacks | Comments Off



    We’ve recently had the honor of meeting up with our partners and customers in the industry and of sharing insights during our annually held convention Direction 2010, held in Tokyo, Japan last July 7. For a panel discussion, I invited representatives from AV-Comparatives, AV-Test, and NSS Labs to Japan to discuss the need for new metrics and methodologies in testing security products against real-world threats. We all agreed that new tests are needed, tests that better reflect attacks on real ...

    Posted in Bad Sites, CTO Insights | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice