• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for July 2015

This Week in Security News

  • Posted on:July 31, 2015
  • Posted in:Current News
  • Posted by:
    Gavin Donovan
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Revealing Widespread Gas Station Cyber Attacks at Black Hat

  • Posted on:July 31, 2015
  • Posted in:Hacks, Security, Web Security
  • Posted by:
    Cara West-Wainwright
1

At Trend Micro it’s always been our job to work out where the next threat is coming from, so we can offer the best protection possible to our customers. Sometimes people listen to us at shows and say: “Seriously? That’s never happened to us.” But that’s the point. It hasn’t … yet. Who would have…

Read More

The Show Goes On—More “Stagefright” Horrors with Auto-Play Videos

  • Posted on:July 31, 2015
  • Posted in:Android, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

Trend Micro researchers are now disclosing additional details about one of the vulnerabilities (CVE-2015-3824) in the so-called “Stagefright” cluster affecting Android users. The “Stagefright” vulnerability is actually a marketing label for a cluster of seven individual vulnerabilities. One of the vulnerabilities in this cluster, CVE-2015-3824, was independently discovered by Trend Micro’s research team at the…

Read More

Zero Day Initiative: Life begins at 10

  • Posted on:July 30, 2015
  • Posted in:Network, Security
  • Posted by:
    Brian Gorenc
0

July 2015 marked the 10th anniversary of the Zero Day Initiative (ZDI), providing us with the opportunity to walk down memory lane. Most of you know that the ZDI is one of the world’s oldest vendor-agnostic bug bounty programs and that it’s owned by HP. That hasn’t always been the case. The ZDI originated at the…

Read More

Ready for Windows 10

  • Posted on:July 29, 2015
  • Posted in:Microsoft, Security
  • Posted by:
    Andrew Stevens
3

Are you ready for Windows 10? Trend Micro has you covered. According to Microsoft, its latest operating system Windows 10 “is familiar and easy to use. It includes an improved start menu and is designed to start-up and resume fast…We’ve designed the upgrade to be easy and compatible with the hardware and software you already…

Read More

Trend Micro Security 10 is Ready for Windows 10

  • Posted on:July 29, 2015
  • Posted in:Consumer, Data Privacy, Microsoft, Security
  • Posted by:
    Shannon McCarty-Caplan
0

Are you ready for Windows 10? We are. According to Microsoft, its latest operating system Windows 10 introduces fresh ways to read, write, store, and share information. We have helpful links (see below) to web pages with tips and tools to assist you in making a smooth upgrade to Windows 10 while maintaining your security…

Read More

Epic Android Vulnerability – What does it mean for you?

  • Posted on:July 28, 2015
  • Posted in:Android, Data Privacy, Mobile Security, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

Security researchers are reporting new, serious vulnerabilities that, they claim, affect 95 percent of the Android phones out there. If that’s not alarming enough, according to the researchers, these vulnerabilities allow attackers to take complete control of your phone with zero interaction—you just need to receive a specially-made multimedia message (MMS). They’re calling this cluster…

Read More

A Look into the Russian Underground

  • Posted on:July 28, 2015
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:Christopher Budd (Global Threat Communications)
0

The Russian Cybercriminal Underground has been around since 2004. In the 11 years since its establishment, it has evolved from a shady, ramshackle bazaar to modern, sophisticated, professional online marketplace that is a crucial part of today’s Deep Web. Here at Trend Micro our Forward-Looking Threat Research Team (FTR) has been researching the Deep Web…

Read More

This Week in Security News

  • Posted on:July 24, 2015
  • Posted in:Current News
  • Posted by:
    Gavin Donovan
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Catch Me If You Can: How APT Actors Are Moving Through Your Environment Unnoticed

  • Posted on:July 23, 2015
  • Posted in:Security
  • Posted by:
    David Dunkel
0

Companies that have experienced data breaches often wonder the same thing—“How were the hackers able to move through my environment for that long without being detected?” The “detection deficit” has been growing steadily over the years as threat actors have improved their ability to stay hidden within organizations networks.  Studies have shown anywhere from 3-8…

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Skimming and Phishing Scams Ahead of Black Friday and Polish Hacking Team Wins Capture the Flag Competition
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.