Skip to content

Current Threat Activity

Pinterest
More Options


How to Protect Your Privacy
on Social Media

How to Protect Your Privacy on Social Media

Oversharing online might do damage to your reputation. Read our latest e-guide to know how you can keep your information private on social networking sites.

Integrated Defense Against Cross-Platform Threats

Integrated Defense Against Cross-Platform Threats

With multiple devices in the workplace, maintaining IT control and protecting corporate data become more complex. Read more...



The Malicious Top Ten

See who and what top the lists for malicious activity from the top ten spammers to the countries with the most botnet-connected computers.

Global Botnet Activity

Real-time Global Botnet Map


Android Malware Use SSL for Evasion

Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), are designed to provide a secure, encrypted connection between a client and a server online. For further authentication and encryption, the server is required to provide certificates. By doing so, the server can prove … [read post]

From the TrendLabs Mobile Malware Blog 17 Sep, 2014

The Chinese Underground In 2013

The Chinese underground has continued to grow since we last looked at it. It is still highly profitable, the cost of connectivity and hardware continues to fall, and there are more and more users with poor security precautions in place. In short, it is a good time … [read post]

From the TrendLabs Mobile Malware Blog 03 Sep, 2014


Connect with us on