• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Paul Oliveria (Technical Communications)

Paul Oliveria

Technical Communications

Adobe Releases Flash Security Update to Patch Exploited Vulnerability

  • Posted on:March 10, 2016
  • Posted in:Vulnerabilities
  • Posted by:
    Paul Oliveria (Technical Communications)
0

Following its release of a security update for Acrobat and Reader, Adobe has released another one, this time to address 23 reported vulnerabilities in Flash. In its advisory (APSB16-08), Adobe notes that this patch addresses critical vulnerabilities that could allow an attack to gain control of an affected system. They further note that one of the vulnerabilities (CVE-2016-1010) “is being used in limited, targeted attacks.”

Read More
Tags: AdobeVulnerabilitiesvulnerability

On Macs, Cross-Platform Threats, and Managing Multiple Devices

  • Posted on:October 16, 2013
  • Posted in:Bad Sites
  • Posted by:
    Paul Oliveria (Technical Communications)
0

Apple will once again take center stage on October 22, when they (probably) unveil new versions of the iPad, iPad mini, MacBook Pro, and the Mac Pro. We will be once again on the lookout for scams and malware that will exploit this event, as they did with the iPhone 5s. The threats mentioned above also reiterate…

Read More
Tags: Apple rumorsMacMalwaremultiplatform threatsphishingscamthreat

Fingerprint Scans, Passwords, and Managing Online Accounts

  • Posted on:September 17, 2013
  • Posted in:Bad Sites
  • Posted by:
    Paul Oliveria (Technical Communications)
0

During last week’s Apple iPhone announcement, one of the standout features that was mentioned was the 5s’s fingerprint sensor, called Touch ID. With this technology, iPhone users can substitute the use of passwords to unlock the home screen and verify purchases in iTunes and App Store. Substitute is the operative word. Technology like Touch ID may…

Read More
Tags: Applefingerprint scanningiPhone 5Sonline account managementpassword security

Corporate Data on Consumer Applications: Striking a Balance

  • Posted on:September 12, 2013
  • Posted in:Mobile, Social
  • Posted by:
    Paul Oliveria (Technical Communications)
0

Much of the current discussions surrounding the growing—and inevitable—trend of consumerization are focused on the impact of bring-your-own device (BYOD) and managing the growing diversity of mobile devices. However, another aspect that IT administrators and even business owners should not forget to consider are the other consumer-oriented technologies and services employees may have access to…

Read More
Tags: BYODconsumerizationdatainformation security

Love Bugs: How Are Valentine Threats Looking Up?

  • Posted on:February 14, 2013
  • Posted in:Malware, Mobile, Spam
  • Posted by:
    Paul Oliveria (Technical Communications)
1

Note: Some of the apps discussed in this blog entry were developed with an older adware SDK that did not contain opt-in provisions, particularly regarding the ability to collect information and display ads outside of the original app. The adware SDK has since been updated to this capability to comply with Google’s developer policies; apps…

Read More
Page 1 of 1212 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.