A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.
The 2014 World Cup has just wrapped up in Brazil and Argentina were not the only losers according to security vendor Trend Micro.
There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.
Trend Micro has launched an initiative to help protect users from potential security threats during the FIFA World Cup that begins on 12 June.
Customers of storage and networking equipment manufacturer Buffalo who downloaded certain files from the company's website in Japan last week might have had their computers infected with an online banking Trojan.
The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers ...
Trend Micro is warning of a phishing campaign touting a "Heartbleed removal" tool, a nonsensical product that is actually malicious software.
Like a crowbar, security software tools can be used for good and evil.
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.
Trend Micro has launched free Heartbleed scanners for PC and Android devices.
Cybercriminals have been developing increasingly sophisticated malware that make use of Windows PowerShell scripts in an attempt to fly under the radar.
A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets.
A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 LG G3 review
- 4 Nokia Lumia 930 review
- 5 Asus G550JK gaming notebook
Best Deals on GoodGearGuide
Latest News Articles
- Why hackers may be stealing your credit card numbers for years
- Reconnaissance code on industrial software site points to watering hole attack
- Europol launches international cybercrime task force
- Show spotlight will be on smartwatches with better looks and connectivity
- China gives Microsoft 20 days to answer questions in anti-monopoly probe
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.