• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for November 2010

Cookies: Not just for Dessert

  • Posted on:November 30, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
2

Photo Courtesy of Scubadive67 from Creative Commons Cookies aren’t just a delicious treat with milk.  Cookies are text files that are created when users visit websites. They store information such as shopping cart contents, registration or log in credentials, and user preferences. When a user returns to a website, a cookie provides information and allows…

Read More

Cloud Security Alliance Congress 2010 Summary – Part 1: Creating a Safer, More Trusted Internet

  • Posted on:November 29, 2010
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Trend Micro
0

The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.

For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterin-the-cloud scanningPrivacyPrivate CloudPublic CloudsaasSecureCloudsecuritySmart Protection Networkvirtualization

Put Spam in the Can

  • Posted on:November 23, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
3

If you’ve got an email account, you’ve had to put up with spam, or UBE (Unsolicited Bulk Email). It’s inconvenient, annoying, and can cause damage. Spam can open you up to the risk of malware, adware, and spyware. It can put your personal information at risk. Fortunately, there are steps you can take to minimize…

Read More

What’s All the Fuss About Privacy?

  • Posted on:November 18, 2010
  • Posted in:Social
  • Posted by:
    Richard Medugno
0

Social networking websites, like Facebook, have exploded in growth over the last few years. While this has allowed people to connect and reconnect in a whole new way, it comes with a risk of a tremendous loss of privacy. There are several steps you should take to protect yourself and your children. Before you start…

Read More

Security Challenges in the Virtual Datacenter

  • Posted on:November 16, 2010
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Securing the journey to virtualization is complicated by two factors – (1) risks that are present in the physical datacenter, and (2) those that are unique to virtualized environments. As enterprises rush to embrace the benefits of virtualization, they have also rushed to implement traditionally architected security solutions in virtualized environments. Unfortunately, while this approach is familiar to enterprises, it results in undesirable consequences.

Read More
Tags: Cloud Securitycloud-based securitycompliancehypervisorsiaasmalwaresecurityvirtualization

Where Do Cybercriminals Learn to Hack?

  • Posted on:November 15, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

If you type in an online search for “learn to hack,” you get over 28 million results. It’s pretty obvious that there are a lot of resources out there for anyone who wants to learn about hacking. You can even learn about specialized hacking: email, Facebook, MySpace, passwords. It’s all out there. Hackers have different…

Read More

The Smart Protection Network

  • Posted on:November 12, 2010
  • Posted in:Trend Spotlight
  • Posted by:
    Richard Medugno
2

You know that you need security protection for your computer, but you may not know what to look for in Internet security software. What makes one type of Internet security different or better than another? Threats to your computer and data have changed over the years. As computers and networks have become more sophisticated, so…

Read More

Money Mules: Don’t do the Laundry!

  • Posted on:November 8, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Many of today’s Internet scams originate overseas, especially in Russia and Eastern Europe.  However, they do rely on a local component, and you want to make sure that you do not end up unwittingly becoming involved in cybercrime. You’ve probably seen ads for what appear to be great job opportunities. “Work from home!  No experience…

Read More

Top Ten Tips for Safe Online Banking

  • Posted on:November 5, 2010
  • Posted in:Social
  • Posted by:
    Richard Medugno
3

When selecting a bank, be it traditional or online, there are several things you should check to ensure that your money will be safe. Yet, online banking requires a few additional precautions that you should follow for a secure banking experience over the Internet. 1. Use caution when choosing a bank. Confirm that the bank…

Read More

Hackers, Zombies, and Bots, Oh My!

  • Posted on:November 1, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Just what are hackers, zombies, and bots? And why should you care? All three of these online threats can cause serious damage, either by getting at your private information or by gaining control of your computer. Here’s a quick summary of these dangerous three: Hackers A hacker is a person who creates and modifies computer…

Read More

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNÂŽ Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.