Vulnerabilities & Exploits
- June 23, 2015Details on the programming languages that gets exploited the most, the reasons behind the numbers, and the downsides of using "popular" software.
- June 10, 2015A Unity Web Player plug-in vulnerability has been discovered that reportedly allows attackers to steal data from online accounts.
- June 02, 2015Mere months after the very first backdoor access vulnerability for Macs was reported, another one has just been discovered with the same capability that doesn’t need physical access to do its dirty work.
- May 21, 2015A new encryption flaw has been found that puts a significant number of Internet users' data at risk. Dubbed as LogJam, the flaw affects websites, mail servers, and other frequently-used Internet services.
- May 19, 2015The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.
- April 23, 2015A flaw that affects iOS devices has been discovered that allows nearby attackers to send apps, and even cause infinite reboot cycles on the iOS devices they run on, rendering them temporarily useless.
- April 13, 2015WordPress sites have recently been defaced by ISIS sympathizers who exploited known vulnerabilities on WP plug-ins. How can Web admins protect their sites from this type of attack?
- March 26, 2015Cybercriminals and attackers are increasingly taking advantage of zero-day vulnerabilities because of the window of opportunity they present. Find out what zero-days are, why they’re dangerous, and what you can do to prevent attacks.
- March 23, 2015Microsoft will be putting the 20 year-old Internet Explorer to rest. With so many Web apps that still reply on older versions of IE, should admins be concerned?