Sending malicious apps via MMS isn't just the only way to exploit the Stagefright vulnerability. Another flaw in the system's mediaserver component involves its inability to properly handle a malformed MP4 file, which leads to a bug that could be explo
Going on a European vacation this summer? Here are some of the threats we've seen that target travelers and tourists, from phishing pages that use vacation-related keywords to risky mobile apps found in the region.
There are privacy and security risks involved in connecting to public or 'free' Wi-fi hotspots. Here's a 4-step guide to setting up a virtual private network (VPN) for the times when you have to connect to unfamiliar networks.
BYOD networks can benefit both the workers and the company, but it also presents a number of potential risks. This infographic details the challenges of balancing employee freedom, functionality, and security on BYOD.
The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.