vulnerabilities

SecurityTrendMicro

Evaluating The Risk Of DoubleAgent

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 24 Mar 2017 20:35:43 +0000

Security startup Cybellum recently announced a new attack that they’re calling “DoubleAgent”. They’ve labelled this a zero day “attack for taking full control over major antiviruses and next-generation antiviruses”. There’s a lot to unpack here. When you’re assessing the risk any issue poses it’s always best to clearly define the issue. Let’s start there. The…

Read More
SecurityTrendMicro

2016 Review of Vulnerabilities

Credit to Author: Jon Clay| Date: Thu, 23 Mar 2017 13:00:45 +0000

In our 2016 security roundup report, A Record Year for Enterprise Threats, we talked about the vulnerability landscape during the year and what trends we saw. Let’s look at some of the key aspects of what we saw in 2016. 1. Trend Micro’s Zero Day Initiative (ZDI) with support of their 3,000+ independent vulnerability researchers,…

Read More
SecurityTrendMicro

The S In HTTPS

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 23 Mar 2017 12:00:37 +0000

If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. The S in HTTPS. SSL/TLS (just to keep it simple, I’ll refer to as SSL) is the technology used to encrypt the communication between your browser and…

Read More
SecurityTrendMicro

The March 2017 Security Update Review

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Tue, 14 Mar 2017 19:30:56 +0000

Just a day before Pwn2Own kicks off its 10th anniversary, join us in looking at the security updates released by Google, Adobe, VMWare, Firefox, and Microsoft for the month of March 2017. It’s shaping up to be the largest Patch Tuesday in history, which is fitting to coincide with the largest Pwn2Own ever. tl:dr –…

Read More
SecurityTrendMicro

Pwn2Own – The Root of Research

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Thu, 02 Mar 2017 13:00:32 +0000

Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever been spilt. It has helped launch people’s careers, or at the very least, it has helped increase their notoriety. It’s been accused of crushing…

Read More