Maikspy Spyware Poses as Adult Game, Targets Windows and Android Users
May 8, 2018
We discovered a malware family called Maikspy — a multi-platform spyware that can steal users’ private data.
Change Your Passwords: Twitter Bug Exposes User Passwords
May 3, 2018
Twitter announced that a bug in their system may have exposed user passwords internally and urged all subscribers to change their account passwords.
PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser
May 3, 2018
Fortunately, there are things you can do to protect your privacy online — both within the sites themselves and by using third-party tools like Trend Micro’s Privacy Scanner.
PROTECTING YOUR PRIVACY – Part 1: The Privacy Risks of Social Networks and Online Browsing
May 1, 2018
Most Americans today spend many of their waking hours online. Much of this time is spent browsing the web or checking in, updating and sharing via our favorite social networks.
Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals
April 27, 2018
Researchers found a design flaw in Alexa that can be exploited to eavesdrop and transcribe to steal all sensitive information heard.
The New Mobile Threat Landscape, circa 2017 to 2018
April 26, 2018
If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat.
Stopping Attacks on Connected Cars - Trend Micro at Hannover Messe
April 23, 2018
At this year’s Hannover Messe, one of the world’s largest industrial technology trade fairs, Trend Micro showcased cybersecurity solutions for cloud applications, smart factories, and the Industrial Internet of Things (IIoT).
Mobile Apps Expose Billions of Unencrypted User Info Through Insecure SDKs
April 20, 2018
Android mobile apps reusing advertising SDKs still using HTTP protocol risk exposing unencrypted user personal information, security researchers warned at the RSA Conference.
Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More
April 16, 2018
If there is anything to be learned from the massive attacks that have been seen on connected devices, it is that the internet of things (IoT) is riddled with vulnerabilities.