We see the ‘cool’ when we wear or operate our smart TVs and watches and all other smart devices we own. But are we aware of how the data is processed in these devices? And where does the data we get or the data that these devices transmit end up? Most, if not all, smart…
Read MoreDianne Lagrimas
Technical Communications
Cybercriminals intending to take your data find various ways through social engineering. For example, in our investigation of what seemed to be a run-of-the mill spam run leading to a pharma site, we’ve uncovered the same points we have raised in our eguide, How Social Engineering Works. The spam run starts as an email notification…
Read MoreThis month’s Microsoft Patch Tuesday release is the lightest month in the past year. Not only did Microsoft release just two bulletins, but also both bulletins are rated Important. The last time Microsoft released bulletins as few as two was in May 2011. In focus this month are two cross-site scripting vulnerabilities found in Visual…
Read MoreThis month, Microsoft issues nine bulletins that addresses a total of 15 vulnerabilities. Of the five bulletins rated Critical, three point to vulnerabilities found in core components in Windows. Remote Desktop Protocol (RDP) and Internet Explorer version 6 to 9, both of which were updated in June, are again included in the critical-rated vulnerability list….
Read MoreMicrosoft released nine bulletins yesterday, including a patch for MS Security Advisory (2719615), which Microsoft put out on the same day of last month’s bulletin release. Although we have not seen an increase in attacks utilizing the said vulnerability, we found several exploit codes and wrote detailed analyses on these. Trend Micro Deep Security and…
Read More