Vulnerabilities & Exploits
- August 27, 2014Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
- August 26, 2014Learn about the biggest mobile threats and more from the first half of 2014.
- August 25, 2014Trend Micro research shows that almost all Netis/Netcore routers have an open port that allows a knowledgeable attacker to exploit your computer and network. It may be time to replace your router.
- August 21, 2014FlashPack exploit kits that affected more than 60K Japanese users were found to be delivered via a compromised website add-on. The tool adds social media sharing buttons on a webpage that may lead to an Adobe Flash exploit.
- August 13, 2014Arbitrary code execution - this is the end-result if your Internet Explorer and Windows Media Center are not updated with the August security patches from Microsoft.
- August 12, 2014Think all apps in your smartphone and tablet are secure? Our analysis on the FakeID vulnerability might change the way you use your apps.
- August 12, 2014Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
- August 04, 2014Evernote issues a patch for its Android app has been found to be vulnerable. In the course of our investigation, however, we found another vulnerability that Evernote has to look at.
- July 29, 2014Trend Micro researchers found two critical vulnerabilties in Alipay, an app payment system popular in China. When exploited, the vulnerabilities allow attackers to manipulate app displays or create phishing pages to get data.