SEPTEMBER 6, 2013
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Something Old, Something New: Zero-Day Exploit for Java 6 Spotted

Security for Home Users
Why It Pays to Patch Programs and Platforms

Security for Business
Dud or Dynamic? Vulnerability Shielding Against Exploits



Security for Home Users

Why It Pays to Patch Programs and Platforms

Updates not only protect your computer from threats, they also protect all of your data.”



Recent news of a Java zero-day exploit highlights the all-too-real risk vulnerabilities and exploits pose to computers. From mere software bugs or flaws, vulnerabilities have become a common target of cybercriminals. In most cases, vulnerabilities serve as a starting point for malicious schemes.

Exploting Vulnerabilities Is a Booming Business

In a span of just six years, the number of common vulnerabilities has more than quadrupled. In 2012, almost 56,000 vulnerabilities were recorded compared with only 7,000 in 2006.

Cybercriminals took notice of the exponential increase in the number of vulnerabilities. Exploit kits that take advantage of vulnerabilities can fetch a good amount in the cybercriminal underground. Prices for individual exploit kits start at US$2,500 while a monthly rental of a kit can go for US$3,000.

Protecting Your Programs and Platforms

Installing updates is one effective way of preventing threats from reaching your computer. However, most users find this process time-consuming. Try to set a schedule for updates or select an “auto-update” setting for your programs and apps. Updates not only protect your computer from threats, they also protect all of your data.

For more information on vulnerabilities and related threats, take a look at our infographic, “Are You Safe Online?

Copyright ©2013 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: