Skip to content

Current Threat Activity

Pinterest
More Options


How to Protect Your Privacy
on Social Media

How to Protect Your Privacy on Social Media

Oversharing online might do damage to your reputation. Read our latest e-guide to know how you can keep your information private on social networking sites.

Integrated Defense Against Cross-Platform Threats

Integrated Defense Against Cross-Platform Threats

With multiple devices in the workplace, maintaining IT control and protecting corporate data become more complex. Read more...



The Malicious Top Ten

See who and what top the lists for malicious activity from the top ten spammers to the countries with the most botnet-connected computers.

Global Botnet Activity

Real-time Global Botnet Map


The Dangers of the Android FakeID Vulnerability

Security researchers from Bluebox Labs recently uncovered a vulnerability that may allow malicious apps to impersonate legitimate ones. This vulnerability, dubbed as “FakeID,” is involved with the checking of certificate signatures to prove the legitimacy of applications. What makes this highly notable is that all … [read post]

From the TrendLabs Mobile Malware Blog 13 Aug, 2014


Connect with us on