Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:

  • Recent Posts

  • Calendar

    July 2014
    S M T W T F S
    « Jun    
  • About Us
    TrendLabs Security Intelligence Blog(breadcrumbs are unavailable)

    Archive for the ‘Data’ Category

    It is an interesting time to be in IT security today. PRISM and Edward Snowden taught many lessons about how companies should secure their data. There's been a lot of discussion about the surveillance aspect of this, but consider this whole affair from the side of the NSA. To the NSA, this was a data breach of unprecedented proportions. All indications are that Snowden was able to exfiltrate a significant amount of classified data; what has been published so far represents ...

    Posted in CTO Insights, Data, Targeted Attacks | Comments Off

    6:09 am (UTC-7)   |    by

    A key part of our cybercrime research focuses on the communities that cybercriminals form. These are used in much the same way that communities of other shared "interests" are - to socialize, to get together, and to buy and sell various items of interest. For security researchers, the activities of these underground communities - and the corresponding economies that they form - is a valuable source of threat intelligence. This allows us to examine current trends in the threat landscape, as ...

    Posted in Data, Malware | Comments Off

    I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today's threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this year had more than 25,000 attendees, 400+ sponsors and exhibitors, with more than 550 speakers. Such was the number of vendors that two large Exposition Halls - ...

    Posted in Data, Malware | Comments Off

    Along with my colleagues, I was able to attend this year’s RSA Conference held at the Moscone Center in San Francisco, and the experience was definitely enlightening, especially in terms of the current state of our industry. “Security of Things” before “Internet of Things” Many new technological frontiers have emerged through the years, and with them, the attack surface also widened dramatically. With the mobile computing boom, threats against critical infrastructure, and now the emergence of the Internet of Things, the industry ...

    Posted in Data, Malware | Comments Off

    Places in the Internet where cybercriminals come together to buy and sell different products and services exist. Instead of creating their own attack tools from scratch, they can instead purchase what they need from peers who offer competitive prices. Like any other market, the laws of supply and demand dictate prices and feature offerings. But what’s more interesting to note is that recently, prices have been going down. Over the years, we have been keeping tabs on major developments in the ...

    Posted in Data, Malware | Comments Off


    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice