Trend Micro’s Mobile Threats Research team has discovered a vulnerability in the Apache Cordova app framework (used to develop Android apps) that allows potential attackers to modify the appearance and behavior of apps just by clicking a specially-crafted URL. This…
Trend Micro Q1 2015 Roundup Sees a Resurgence of Old Threats
Trend Micro Q1 2015 Roundup Sees a Resurgence of Old Threats Indicating possible complacency amongst security professionals SINGAPORE, May 20, 2015 – In the first quarter of 2015, Trend Micro Incorporated’s (TYO: 4704; TSE: 4704) quarterly threat roundup report saw the rise of reemerging…
Messaging Application LINE Used as a Decoy for Targeted Attack
According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…
Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House
This year, the North Atlantic Treaty Organization (NATO) members and the White House are the newest targets of the long-running APT campaign Operation Pawn Storm, along with an introduction of new infrastructure. Latest intelligence as a follow-up to Trend Micro’s October…
Trend Micro Joins INTERPOL Botnet Takedown, Presents at INTERPOL World 2015
Trend Micro Joins INTERPOL Botnet Takedown, Presents at INTERPOL World 2015 SINGAPORE, April 13, 2015 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, has been a historical advocate in public/private partnerships to combat cybercrime…
Trend Micro Report finds that Corporate Data is the Pot of Gold at the end of the rainbow for cybercriminals
Trend Micro Report finds that Corporate Data is the Pot of Gold at the end of the rainbow for cybercriminals Cybercriminals adopt new targeted attack techniques and assaults that threaten target networks. Singapore, April. 16 2015 – In Trend Micro’s…
Trend Micro’s 2014 Security Roundup Highlights the Terrible Cost of Cyberattacks for Organisations
Trend Micro’s 2014 Security Roundup Highlights the Terrible Cost of Cyberattacks for Organisations Complacency is no longer an option in 2015 for enterprise cybersecurity SINGAPORE, March 10, 2015 – Trend Micro Incorporated (TYO: 4704; TSE:4704) today announced its 2014 Annual Security Roundup Report, titled “The High…
FREAK Vulnerability Existing Since the 1990s
A newly discovered vulnerability believed to exist since the 90s has been discovered. Dubbed as FREAK, (Factoring RSA Export Keys), the vulnerability forces a secure connection to use weaker encryption—making it easy for cybercriminals to decrypt sensitive information. The flaw came about…
Trend Micro uncovers unique cyberattacks against Israel and Egypt
Trend Micro’s Forward Threat Research team in conjunction with the United States Air Force has uncovered a new series of attacks against Israeli and Egyptian targets in a report coined “Operation Arid Viper: Bypassing the Iron Dome.” This attack is…
iOS Espionage App Found
Have you heard of Operation Pawn Storm? It is an active economic and political cyber-espionage operation that targets a wide range of entities, like the military, governments, defense industries, and the media as well. This group of connected threat actors use…
Trend Micro a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms
Trend Micro a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms SINGAPORE, Jan. 27, 2014 – According to Trend Micro’s recent H1 Targeted Attack Trends Report, threat actors targeting the APAC region are consistently refining their targeted attack tactics, which allows…
Flash Greets 2015 With New Zero-Day Vulnerability
Flash Greets 2015 With New Zero-Day Vulnerability 23 January 2015 – Trend Micro has recently learned of a new problem affecting Adobe Flash. This is a serious situation that affects nearly everyone using Microsoft Windows. Below is a very easy-to-understand summary of…
MBR Wiper Attacks Strike Korean Power Plant
In recent weeks, a major Korean electric utility has been affected by destructive malware, which was designed to wipe the master boot records (MBRs) of affected systems. It is believed that this MBR wiper arrived at the target systems in…
Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques
Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques Shellshock revelation, new attacks against mobile and web platforms dissected in quarterly report Singapore, Dec. 3, 2014 – The third quarter saw a significant event with the new critical vulnerability, known as…