Mere months after the very first backdoor access vulnerability for Macs was reported, another one has just been discovered with the same capability that doesn’t need physical access to do its dirty work.
A new encryption flaw has been found that puts a significant number of Internet users' data at risk. Dubbed as LogJam, the flaw affects websites, mail servers, and other frequently-used Internet services.
The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.
Cybercriminals and attackers are increasingly taking advantage of zero-day vulnerabilities because of the window of opportunity they present. Find out what zero-days are, why they’re dangerous, and what you can do to prevent attacks.
In this video, Trend Micro CTO Raimund Genes discusses how security researchers and software vendors should work together and to stop fueling the industry that buys and sells vulnerability information.