Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Data’ Category




    When people discuss the Internet of Everything (IoE), it refers to the introduction of computing power and networking capabilities to previously "dumb" devices like television sets, cars, pedometers, and appliances. Many believe that it is the next big thing in tech, and it offers users a wide array of benefits, allowing them to save time, money, or even improve their lives.  These gadgets range from the merely nice to have, all the way to mission critical tools. However, the Internet connectivity and computing ...

    Posted in Data, Social |



    In the previous part of this post, we explained what the "smartification" of the home is, why people are adopting it, and looked into some of the factors that can influence how people choose to add home automation into their daily lives. What are some additional factors that influence whether smart devices are accepted into homes? Replacement of Existing Equipment As existing devices and appliances in the home need replacement, homeowners may choose to replace these with smart devices. Of course, users may ...

    Posted in Data, Social, Vulnerabilities |



    Over the past few years, there has been proliferation of intelligent connected devices introduced into homes across the globe. These devices can range from the familiar - such as tablets, smart phones, and smart TVs - to the less familiar, such as utility meters, locks, smoke and carbon monoxide detectors, motion detectors and scales. Other devices, like wearable technologies, or wearables, such as fitness and lifestyle monitoring devices, and smart glasses are making an entrance into our regular way of life. This effect, known as “smartification” ...

    Posted in Data, Social, Vulnerabilities |


    Jun5
    10:17 am (UTC-7)   |    by

    The many announcements at Apple's 2014 Worldwide Developers Conference (WWDC) this week was welcome news to the throngs of Apple developers and enthusiasts. It was also welcome news for another group of people with less than clean motives: cybercriminals. Last week we got a concrete example of how some cybercriminals are now actively targeting Apple ID accounts. A thread in the Apple support forums was filled with users complaining that their devices had been locked, with a message from a certain "Oleg Pliss" demanding $100 to unlock ...

    Posted in Data, Mac |



    Last month, there was a very interesting decision out of the European Court of Justice. The decision established what can be called the "right to be forgotten". People can now ask search engines like Google to remove links from search results about them. So, for example, say you are now a successful businessman. However, the first search results for your name is a slightly embarrassing incident that took place in your youth. Now, you can ask Google to "forget" about that incident so it won't ...

    Posted in CTO Insights, Data |


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice