JULY 4, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
One Document Exploit, Several Targeted Attacks

Security for Home Users
Smarter Living

Security for Business
Endpoint Security Evolution

Security Spotlight

One Document Exploit, Several Targeted Attacks

Emails are still the most commonly used means to infiltrate networks and systems. Attackers know and so abuse this fact. But because companies believe emails are still the most secure and convenient means to send and receive business correspondence, problems arise.


Read on >>

Security for Home Users

Smarter Living

The Internet of Everything (IoE), also known as the “Internet of Things (IoT),” is unstoppable. Change is inevitable because we’ll always look for things and ways to make life more convenient. Gone are the days when consumer demand dictated supply. Today, the latest technologies dictated what are made available in the market.


Read on >>

Security for Business

Endpoint Security Evolution

We’ve seen technology grow and evolve at a rapid pace. To keep up, attackers also keep getting better at their craft. They abuse the latest tool, vector, bug, trend, platform, or device. After all, finding weak spots to exploit and use to their advantage is the name of their game.


Read on >>

We appreciate your interest in the Trend Micro First Line of Defense Newsletter. If you would like to receive future copies of this newsletter, please OPT IN to our mailing list.

Trend Micro guards your privacy. Read our PRIVACY POLICY.

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com Click here to unsubscribe.