Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    May 2015
    S M T W T F S
    « Apr    
     12
    3456789
    10111213141516
    17181920212223
    24252627282930
    31  
  • Email Subscription

  • About Us


    Archive for the ‘Vulnerabilities’ Category




    This month's Patch Tuesday release appears moderately light compared with the previous month's, with only 11 security bulletins with four rated 'Critical', while the rest are rated as 'Important'. Microsoft addressed a total of 26 vulnerabilities this April. The critical security updates issued by Microsoft all deal with remote code execution (RCE) vulnerabilities. One of the updates rated as 'Critical' is MS15-033 or Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3048019) addresses flaws that could be exploited across several versions of Microsoft ...

    Posted in Vulnerabilities |



    Digital certificates are the backbone of the Public Key Infrastructure (PKI), which is the basis of trust online. Digital certificates are often compared to signatures; we can trust a document because it has a signature, or certificate authority (CA) by someone we trust. Simply put, digital certificates are a reproduction of a simple model which occurs in the real world. Incidents involving digital certificates have been in the news recently. Issues surrounding digital certificates and CAs are not always clear or noticeable ...

    Posted in Vulnerabilities |



    Support for Windows XP ended over a year ago. By any standard, Windows XP ranks as one of the most influential versions of Windows ever, thanks to its longevity and widespread adoption by enterprises around the world. However, the end of support should have served as a clear signpost to users and organizations to immediately upgrade to newer systems. A year later, remarkably, Windows XP isn't quite dead yet. Its exact share can be debated. Net Market Share data suggests its ...

    Posted in Vulnerabilities |



    Security researchers Luca Carettoni and Mauro Gentile recently found during their research that even though Adobe has fixed an old vulnerability found in 2011 (CVE-2011-2461), its side effects still linger around the Internet. Your favorite websites might still be affected by this bug. They have shared great details in their blog post. Let’s take a quick look at the issue and how the vulnerability impacts both site owner and end users. What’s the issue? The vulnerability was in the Adobe Flex SDK, which is used to create Internet ...

    Posted in Vulnerabilities |



    2014 showed that vulnerabilities could be found in all applications - both Heartbleed and Shellshock caught system administrators off-guard by revealing that open-source server applications could have severe vulnerabilities as well. The reality is that making software free from vulnerabilities is difficult and expensive, if not completely impossible. For every thousand lines of code, you can expect to find 15 to 50 errors of some kind. Maybe you can get that error rate down for truly critical applications like space exploration, but ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice