Being a leader in security for over 25 years, we’ve seen a lot of change – in threats, in technology and now recently, in server technology. The truth is that no two data centers are alike anymore. Some are in an early stage of virtualizing your servers, others are already at 90% virtualization. Some organizations…Read More
Every day it’s a challenge for me to not get jaded by the constant flow of negative news and accounts of horrific human behavior that I learn about. For my mental health, I need to maintain a balanced outlook on the world and hold strong to a core belief that most people are basically good….Read More
With “2020: The Series,” we took a look at what the future of cybercrime may hold. With Blurring Boundaries, we shift our focus to the upcoming year and what it will bring. The fourth prediction in the report predicts that we will see one major data breach incident each month in 2014. That’s big enough that it…Read More
Adobe ColdFusion has been at the heart of several high-profile attacks affecting state and federal government agencies, as well as limousine service CorporateCarOnline.
Trend Micro will be at Gartner’s Data Center Conference 2013 in Las Vegas all this week talking about our vision around the future of securing the data center. As you know from living and breathing your job every day, data centers are evolving at a rapid pace, with organizations embracing server virtualization and the cloud…Read More
The videos in “2020: The Series” present a speculative portrayal of life in the fictional country of “South Sylvania” in the year 2020. The goal of the series is to imagine a progression of possible what-ifs around security and privacy in the future. In the tradition of science fiction, the series looks to today and…Read More
The real-money online poker community, already a long-standing subject of scrutiny from governments and regulators, recently became the target of an international malware campaign involving the theft of sensitive personal data from players’ computers. The threat originates with i2Ninja, a Trojan from Russia that communicates with a botnet and utilizes several interesting features, including an anonymous cryptographic network and secure help desk interface.
Released more than 12 years ago, Windows XP is easily the oldest major operating system still in widespread use, with considerable market share even now among government agencies and private enterprises.
I had a tremendous opportunity this week to moderate and co present with an FBI special agent regarding the latest attack trends against SMB (Small and Medium Sized Businesses). Our audience was informed on the types of tactics and approaches being leveraged by cyber criminals, hacktivists as well as nation-state actors against SMB’s. The cadence…Read More
Do you need some Internet security advice or information—without a sales pitch? Do you want to educate yourself about Internet threats and how to avoid becoming a victim? We’ve got just the place for you. It’s a mini-website called Internet Safety @ Home. You should check it out. There’s everything you need to know about…Read More