• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for July 2015

MMS Not the Only Attack Vector for “Stagefright”

  • Posted on:July 31, 2015 at 2:25 am
  • Posted in:Mobile, Vulnerabilities
  • Author:
    Wish Wu (Mobile Threat Response Engineer)
5

Earlier this week Zimperium zLabs revealed an Android vulnerability which could be used to install malware on a device via a simple multimedia message. This vulnerability, now known as Stagefright, has gained a lot of attention for the potential attacks it can cause. Stagefright makes it possible, for example, for an attacker to install a spyware app…

Read More
Tags: androidGoogleMediaserverstagefrightvulnerability

Flash Threats: Not Just In The Browser

  • Posted on:July 30, 2015 at 2:09 pm
  • Posted in:Exploits, Malware, Targeted Attacks
  • Author:
    Trend Micro
0

July has been a fairly poor month for Adobe Flash Player security, to say the least. Three separate zero-day vulnerabilities (all courtesy of the Hacking Team dump) have left many people concerned about Flash security, with many (including this blog) calling for it to go away. Some sort of reaction from Adobe to improve Flash…

Read More
Tags: 0dayadobe flashTargeted Attack

FuTuRology: Wearables and Smart Medical Devices, Gears for a Data-Driven Healthcare Future

  • Posted on:July 30, 2015 at 7:48 am
  • Posted in:Internet of Things
  • Author:
    David Sancho (Senior Threat Researcher)
0

This is the second post in the “FuTuRology” project, a blog series where the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of popular technologies. Make sure to check the first entry of the series for a brief introduction on the project. Predicting the future sucks. It does because we are never right….

Read More
Tags: futurologyhealthcareinternet of thingsIOTsmart device

Windows 10’s New Browser Microsoft Edge: Improved, But Also New Risks

  • Posted on:July 29, 2015 at 12:35 pm
  • Posted in:Vulnerabilities
  • Author:
    Henry Li (Threats Analyst )
4

Last week we discussed how Microsoft Edge, the new browser in Windows 10, represented a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that aren’t present in older versions. Integrated plug-ins Microsoft Edge has now integrated two widely used plug-ins into the browser itself: Adobe Flash and a PDF reader….

Read More
Tags: Internet ExplorerMicrosoftmicrosoft edgeWindows

Trend Micro Discovers Vulnerability That Renders Android Devices Silent

  • Posted on:July 29, 2015 at 2:05 am
  • Posted in:Mobile, Vulnerabilities
  • Author:
    Wish Wu (Mobile Threat Response Engineer)
24

We have discovered a vulnerability in Android that can render a phone apparently dead – silent, unable to make calls, with a lifeless screen. This vulnerability is present from Android 4.3 (Jelly Bean) up to the current version, Android 5.1.1 (Lollipop). Combined, these versions account for more than half of Android devices in use today. No…

Read More
Tags: androidjellybeanMediaservermobile vulnerabilities
Page 1 of 812 › »

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.