Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    December 2014
    S M T W T F S
    « Nov    
     123456
    78910111213
    14151617181920
    21222324252627
    28293031  
  • Email Subscription

  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘CTO Insights’ Category




    Check out the TrendLabs 2Q 2013 Security Roundup. Threats on mobile platforms, devices, and applications have been swelling up over the past years; but this quarter, they have finally gone full throttle. Cybercriminals have found more sophisticated ways to bypass mobile security, and it’s not just through malicious applications anymore. Android Updates Lag, Users Suffer Critical Flaws Proof of the Android “Master Key” vulnerability rose with the discovery that cybercriminals can exploit the flaw to update original apps with malicious ones. The multicomponent ...

    Posted in Bad Sites, CTO Insights, Malware, Mobile, Vulnerabilities | Comments Off


    Jun17
    12:56 am (UTC-7)   |    by

    At the end of May, two Google security engineers announced Mountain View's new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently in the wild should be released no more than seven days after the vendor has been notified. Ideally, the notification or patch should come from the vendor, but they also indicated that researchers should release the details themselves if the vendor was not forthcoming. This is a pretty aggressive goal. Microsoft, for example, ...



    May7
    1:02 pm (UTC-7)   |    by

    Last month, an article in Dark Reading by Robert Lemos asked if it was "Time To Dump Antivirus As Endpoint Protection?". It referenced a recent Google research paper that outlined their new reputation technology called CAMP (short for Content-Agnostic Malware Protection), which they claim protects against 98.6% of malware downloaded via their Chrome browser, as opposed to the 25 percent detected by the best performing antivirus engine they tested. This may sound like magic. Whether you view this as white magic ...

    Posted in Bad Sites, CTO Insights, Malware | Comments Off



    As the year draws to a close it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. Here are some of my predictions: The volume of malicious and high-risk Android apps will hit 1 million in 2013. As Android grows, so does the threat of malicious and high risk apps for its users. In 2013, we will be able to detect ...




    We know that threat actors take time to study the network environments of their prey. As employees go more and more mobile, the emergence of mobile malware in targeted attacks seems to be a logical progression. For the past few months, however, this notion has been all speculation—and we wondered, not if, but when it will happen. Today, we can say for sure: it has. At DEFCON, we presented for the first time that file infector viruses could be written on Android ...

    Posted in Bad Sites, CTO Insights, Mobile, Targeted Attacks | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice