• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Mobile Security

Back-to-School Time: Is Your Child’s Mobile Device Secure?

  • Posted on:August 25, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Susan Orbuch
0

Once upon a time, the back-to-school weeks used to involve parents buying their children new shirts, pants, and shoes for the year ahead. But times have changed. Today, it’s more likely anxious moms and dads are investing significantly more of their hard earned dollars into laptops, smartphones, and tablets for their little ones. But while…

Read More

Hacking Team: The Android Connection

  • Posted on:August 20, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

In the crush of news about the Hacking Team attacks and the subsequent flurry of vulnerabilities, mainly affecting Adobe, there was one piece of critical information for Android users that many have overlooked. Among the tricks and tools that we’ve discovered the Hacking Team has at their disposal is a particularly nasty piece of Android…

Read More

Get Your Mobile Mojo On and Do Great Things Online Safely

  • Posted on:August 10, 2015
  • Posted in:Consumer, Data Privacy, Mobile Security, Security
  • Posted by:
    Susan Orbuch
2

New Versions of Trend Micro Mobile Security Now Available Unless you’ve been hibernating for a few years, you probably know that the Internet Age has quickly evolved into the Mobile Internet Age (MIA). Now-a-days, it seems everyone is maintaining an MIA lifestyle using at least one smartphone and probably a tablet, too, to get online.Ā …

Read More

Epic Android Vulnerability – What does it mean for you?

  • Posted on:July 28, 2015
  • Posted in:Android, Data Privacy, Mobile Security, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

Security researchers are reporting new, serious vulnerabilities that, they claim, affect 95 percent of the Android phones out there. If that’s not alarming enough, according to the researchers, these vulnerabilities allow attackers to take complete control of your phone with zero interaction—you just need to receive a specially-made multimedia message (MMS). They’re calling this cluster…

Read More

Unpatchable Android?

  • Posted on:June 18, 2015
  • Posted in:Android, Hacks, Mobile Security, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

There’s another vulnerability affecting the Android platform that this week once again raises the question: am I vulnerable? Researchers from NowSecure announced at Black Hat in London this week a vulnerability affecting the SwiftKey keyboard on Android. The biggest concern is for Samsung Galaxy phones which install the SwiftKey keyboard by default and allow it…

Read More

Where to Donate Your Old Smartphone…

  • Posted on:April 30, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Richard Medugno
0

…And What to Do Before You Get Rid of It It’s time to spring clean! If you’re like me, you hate to toss a piece of hardware into the garbage. Happily, over the past couple of decades the reuse-recycle-repurpose trend has taken hold and expanded in our society. There are many ways to avoid just…

Read More
Page 3 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.