Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    December 2014
    S M T W T F S
    « Nov    
     123456
    78910111213
    14151617181920
    21222324252627
    28293031  
  • Email Subscription

  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Social’ Category




    When people discuss the Internet of Everything (IoE), it refers to the introduction of computing power and networking capabilities to previously "dumb" devices like television sets, cars, pedometers, and appliances. Many believe that it is the next big thing in tech, and it offers users a wide array of benefits, allowing them to save time, money, or even improve their lives.  These gadgets range from the merely nice to have, all the way to mission critical tools. However, the Internet connectivity and computing ...

    Posted in Internet of Everything, Social | Comments Off



    In the previous part of this post, we explained what the "smartification" of the home is, why people are adopting it, and looked into some of the factors that can influence how people choose to add home automation into their daily lives. What are some additional factors that influence whether smart devices are accepted into homes? Replacement of Existing Equipment As existing devices and appliances in the home need replacement, homeowners may choose to replace these with smart devices. Of course, users may ...

    Posted in Internet of Everything, Social, Vulnerabilities | Comments Off



    Over the past few years, there has been proliferation of intelligent connected devices introduced into homes across the globe. These devices can range from the familiar - such as tablets, smart phones, and smart TVs - to the less familiar, such as utility meters, locks, smoke and carbon monoxide detectors, motion detectors and scales. Other devices, like wearable technologies, or wearables, such as fitness and lifestyle monitoring devices, and smart glasses are making an entrance into our regular way of life. This effect, known as “smartification” ...

    Posted in Internet of Everything, Social, Vulnerabilities | Comments Off



    The 2014 FIFA World Cup in Brazil is all but underway, and the fervor of such a prestigious and newsworthy event is already setting competing nations' populations on fire. Unfortunately, cybercriminals are getting into the mood too. Besides recently flooding the internet with phishing scams and the taking down two Brazilian government sites by hacktivists (the Sao Paulo Military Police website  and the official World Cup 2014 Brazil website), cybercriminals are also targeting the mobile scene with scads of World Cup-themed mobile malware  - ...

    Posted in Bad Sites, Malware, Mobile, Social | Comments Off



    Facebook users are once again the target of a malicious scheme—this time in the form of a notification about "Facebook Chat". The spammed notification pretends to come from the "official Facebook Chat Team." A notification shows users of a tagged comment to a Facebook Note containing a fake announcement about a Facebook Chat verification requirement. Figure 1. Facebook Chat verification notification The spam tries to sound urgent to convince users to verify their accounts. To do so, they are first asked to to ...

    Posted in Social, Spam | Comments Off


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice