• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Jamz Yaneza (Threat Research Manager)

Jaime Lyndon Yaneza

Threat Research Manager

Road to Windows 8 Security: Improved, but with Bumps

  • Posted on:October 26, 2012
  • Posted in:Bad Sites
  • Posted by:
    Jamz Yaneza (Threat Research Manager)
1

With its launch of Windows 8, Microsoft promises a rejuvenated OS and brand that translate to improved user experience. But when it comes to security, did Microsoft take it up a notch? Beyond Window 8’s interface and over-all experience, users are also concerned with its resilience against threats. Below are some of my observations on…

Read More

A Flashback Postmortem: What Mac Users Need to Know

  • Posted on:April 19, 2012
  • Posted in:Mac, Malware
  • Posted by:
    Jamz Yaneza (Threat Research Manager)
3

 With Apple pushing out both a standalone removal tool for users and a combined Java update/removal tool, it’s safe to say that the current outbreak of Flashback malware is well on its way to being addressed. However – such a widespread incident (affecting at least 1% of all Macs in use today) is likely to…

Read More
Tags: AppleFlashbackMac

Mobile Threat Landscape: A Decade Later

  • Posted on:February 2, 2012
  • Posted in:Bad Sites
  • Posted by:
    Jamz Yaneza (Threat Research Manager)
2

We already knew that more and more people are becoming tablet and smartphone owners, but two new surveys that were released just this week reinforced that. A Google/Ipsos poll found that smartphone use was growing in all 5 surveyed countries. In the US, smartphone ownership rose from 31% to 38% of the population by September/October…

Read More

Search Monetization As a New Threat to the Mobile Platform

  • Posted on:January 30, 2012
  • Posted in:Mobile
  • Posted by:
    Jamz Yaneza (Threat Research Manager)
3

Last week we came across a report about a Plankton variant embedded in various apps emerging in the Android Market. One of the samples we inspected is a puzzle game called Sexy Ladies-2.apk, which is detected as ANDROIDOS_PLANKTON.P along with many other apps related to it. Other external reports tell of the millions of app downloads…

Read More

What’s in Apple Security Update 2011-03?

  • Posted on:June 6, 2011
  • Posted in:Bad Sites, Mac
  • Posted by:
    Jamz Yaneza (Threat Research Manager)
4

The recently reported malware attacks against Mac users prompted Apple to release a security update. We did initial analyses of both the FAKEAV for Macs as well as the latest Apple security update in our previous blog entry. I’ve extracted the version of XProtect.plist (Apple’s pattern file) to dig deeper into what’s inside it. The…

Read More
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.