Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    August 2014
    S M T W T F S
    « Jul    
     12
    3456789
    10111213141516
    17181920212223
    24252627282930
    31  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Author Archive - Ryan Certeza (Technical Communications)




    When it comes to multiple passwords, are you someone akin to the mighty elephant who never forgets, or are you one with the memory of a goldfish?

    Here at the Security Intelligence blog, we’ve talked about passwords at length. From recent events that involve mass password leakages to how to improve your existing passwords, we’ve written quite a bit to stress just how important these strings of letters and numbers are and how to make them more secure. But what about keeping track of every single one of them when you’ve got more than you can reliably remember? With an average user juggling up to 10 accounts at once, memorizing each and every password you have can prove to be quite the challenge.

    It’s with this e-guide that we strive to help you, the everyday user, against this conundrum that all of us will face sooner or later. Not unlike a set of keys, passwords carry with them quite dire consequences should they fall into the wrong hands. In this document, we provide ways in which to prevent such an occurrence from happening, as well as specific tips and tricks to aid you not only in remembering your passwords better but also in their creation.

    We can’t all be elephants, after all. Even us goldfishes need to keep their passwords secure.

     
    Posted in Bad Sites | Comments Off



    Cybercriminals are fond of capitalizing on big sporting events, and it doesn’t get any bigger than the Olympics. With a worldwide audience, this prestigious event is more than just a prime target for cybercriminals, it’s a huge money-making opportunity.

    You can be sure, then, that these thieving digital miscreants are all racing to make you their latest victim. Not only that, they’re already out of the gate even before the opening ceremonies, each one eager to be the first to hand you a baton of threats.

    The first pass was made a few days ago when we detected a fraud website advertising itself on Facebook, claiming to sell tickets to the event. Upon further analysis, it was revealed to be a phishing website, created to collect personal information from unsuspecting victims.

    The second one was spotted to be targeting Japanese users. A website was found selling illegal cards that would allow users to view the Olympics for free. The website itself processes user payments in an unsafe manner, which could present certain risks to users’ financial information.

    Cybercriminals have not been slacking on the email front, either, as more than 50 spammed mails have been discovered, all of them scams related to the 2012 London Olympics. One of them claims to be a notification for an Olympic Email Lottery winner, with the user supposedly winning a large sum of cash.

    We’re sure that this is only a preview of things in terms of the relay race cybercriminals are running to take advantage of the Olympics. Do you have what it takes to make sure they don’t come in first? To help prepare yourself, check out our infographic:

     
    Posted in Social | Comments Off



    Online gaming, just like anything else involving the Internet, carries certain risks and threats that could affect your experience. These dangers, if not addressed, could also have effects that may end up with you losing not only your items and achievements, but also much more valuable things. These things include your own hard-earned cash and your privacy.

    Some of the threats an online gamer may encounter (and are tackled in our new e-guide in fuller detail):

    • Account theft – Player accounts in MMORPGs may be hacked into and stolen.
    • Scams – Deceitful players who trick other players into giving them money for fraudulent reasons.
    • Inappropriate content – Content that is inappropriate to gamers of certain ages

    This is why we made an e-guide to help online gamers secure what’s important in their gaming lifestyle. We created an outline of things an online gamer should look out for during a session, and the best practices to keep in mind during such activities.

     



    Clutter is something that appears harmless in small amounts, but can be a hassle if it accumulates. That’s why it’s a good idea to devote time into clearing it out – not just from our houses and living spaces, but also from our digital lives. Doing so not only improves our overall image, it also eliminates the possibility of any embarrassing moments when company comes over to visit (or in our digital life’s case, when someone visits our profile). Just like how a clean house is always better to live in than a messy one, a digital life that’s free from electronic rubble not only benefits us, but also those around us.

    To help you on your way, we’ve put together an e-guide containing handy tips in taking out the clutter of your digital life. Specifically this guide focuses on the three main aspects of your digital life: your desktop (or laptop, whichever applies), your mobile device, and your digital reputation.

    We also included some pointers that you can take to heart not just with those three aspects, but also in whatever you do. These can be helpful not only to keep what’s important at bay from cybercriminals, but also to ensure that those crucial data never gets lost.

    You can check out our guide in full. For additional tips, you can also check out the relevant article posted at Fearless Web here.

     
    Posted in Social | Comments Off



    In the chain of business security, humanity is the weakest link.

    Even with the most stringent and sophisticated suite of protection, the risk of your business-critical data being stolen is ever present, especially if your employees are unaware (or even worse, apathetic) of the security risk they pose. Precautions can be made against data breaches. Devices and systems can be safeguarded from outside attack.

    Despite this, every business owner should always consider the human factor as the most important one in data protection.

    To bring that same factor into focus, we here at Trend Micro worked together with research firm The Ponemon Institute, in an effort to help business owners understand this factor and  how to better address it. The summarized results of this collaborative effort is available for your perusal here. Along with this report, we also have other key materials you may find helpful:

    Click for larger view

    The human factor may be the weakest link, but that doesn’t mean it has to remain that way.

    Update as of April 4, 2012 4:06 AM (PST)

    Never underestimate the impact of the human factor when it comes to data protection. As Trend Micro’s CTO Raimund Genes states, in order to protect company assets, it is the responsiblity of security professionals to educate users on what and what not to reveal online. For more of his insights, you may watch the video The Human Factor of Targeted Attacks.

     


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice