Trend Micro Archives - Page 5 of 7 - The Tech Revolutionist
Trend Micro Discovers Apache Cordova Vulnerability that Allows One-Click Modification of Android Apps

Trend Micro’s Mobile Threats Research team has discovered a vulnerability in the Apache Cordova app framework (used to develop Android apps) that allows potential attackers to modify the appearance and behavior of apps just by clicking a specially-crafted URL. This…

Trend Micro Q1 2015 Roundup Sees a Resurgence of Old Threats

Trend Micro Q1 2015 Roundup Sees a Resurgence of Old Threats Indicating possible complacency amongst security professionals SINGAPORE, May 20, 2015 – In the first quarter of 2015, Trend Micro Incorporated’s (TYO: 4704; TSE: 4704) quarterly threat roundup report saw the rise of reemerging…

Messaging Application LINE Used as a Decoy for Targeted Attack

According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…

Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House

This year, the North Atlantic Treaty Organization (NATO) members and the White House are the newest targets of the long-running APT campaign Operation Pawn Storm, along with an introduction of new infrastructure. Latest intelligence as a follow-up to Trend Micro’s October…

Trend Micro Joins INTERPOL Botnet Takedown, Presents at INTERPOL World 2015

Trend Micro Joins INTERPOL Botnet Takedown, Presents at INTERPOL World 2015 SINGAPORE, April 13, 2015 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, has been a historical advocate in public/private partnerships to combat cybercrime…

Trend Micro Report finds that Corporate Data is the Pot of Gold at the end of the rainbow for cybercriminals

Trend Micro Report finds that Corporate Data is the Pot of Gold at the end of the rainbow for cybercriminals Cybercriminals adopt new targeted attack techniques and assaults that threaten target networks. Singapore, April. 16 2015 – In Trend Micro’s…

Sextortion in the Far East: Blackmail Goes Mobile

Today, personal communication is greatly enabled and enhanced by various messaging apps that provide text messaging, voice calls, photo sharing, and even video chat. These apps are often found in smartphones —devices that have all the features of a desktop computer, plus Wi-Fi, cellular, GPS,…

Trend Micro’s 2014 Security Roundup Highlights the Terrible Cost of Cyberattacks for Organisations

Trend Micro’s 2014 Security Roundup Highlights the Terrible Cost of Cyberattacks for Organisations Complacency is no longer an option in 2015 for enterprise cybersecurity SINGAPORE, March 10, 2015 – Trend Micro Incorporated (TYO: 4704; TSE:4704) today announced its 2014 Annual Security Roundup Report, titled “The High…

FREAK Vulnerability Existing Since the 1990s

A newly discovered vulnerability believed to exist since the 90s has been discovered. Dubbed as FREAK, (Factoring RSA Export Keys), the vulnerability forces a secure connection to use weaker encryption—making it easy for cybercriminals to decrypt sensitive information. The flaw came about…

Trend Micro uncovers unique cyberattacks against Israel and Egypt

Trend Micro’s Forward Threat Research team in conjunction with the United States Air Force has uncovered a new series of attacks against Israeli and Egyptian targets in a report coined “Operation Arid Viper: Bypassing the Iron Dome.” This attack is…

iOS Espionage App Found

Have you heard of Operation  Pawn Storm? It is  an active economic and political cyber-espionage operation that targets a wide range of entities, like the military, governments, defense industries, and the media as well.  This group of connected threat actors use…

Trend Micro a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms

Trend Micro a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms SINGAPORE, Jan. 27, 2014 – According to Trend Micro’s recent H1 Targeted Attack Trends Report, threat actors targeting the APAC region are consistently refining their targeted attack tactics, which allows…

Flash Greets 2015 With New Zero-Day Vulnerability

Flash Greets 2015 With New Zero-Day Vulnerability 23 January 2015 – Trend Micro has recently learned of a new problem affecting Adobe Flash. This is a serious situation that affects nearly everyone using Microsoft Windows. Below is a very easy-to-understand summary of…

MBR Wiper Attacks Strike Korean Power Plant

In recent weeks, a major Korean electric utility has been affected by destructive malware, which was designed to wipe the master boot records (MBRs) of affected systems. It is believed that this MBR wiper arrived at the target systems in…

Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques

Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques Shellshock revelation, new attacks against mobile and web platforms dissected in quarterly report   Singapore, Dec. 3, 2014 – The third quarter saw a significant event with the new critical vulnerability, known as…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"