• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for May 2011

Chrome OS: So secure we don’t need security?

  • Posted on:May 31, 2011
  • Posted in:Cybercrime
  • Posted by:Rik Ferguson (VP, Security Research)
2

With the launch announcements of various Google Chrome OS netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of the more ’media friendlyā€˜ statements such as, ā€œ…users don’t have to deal with viruses, malware and security updatesā€.

Read More
Tags: Chrome OSChrome OS securityCloud Securitycloud-based securitycybercrimecybercriminalsGoogleGoogle AppsGoogle ChromeGoogle Chrome netbooksGoogle Chrome OSGoogle Chrome OS netbooksGoogle Chrome OS securitymalwaremobile devicesportabilitySecureCloudsecuritySmart Protection NetworkthreatsVulnerabilities

Lockheed says data breach quickly thwarted

  • Posted on:May 31, 2011
  • Posted in:Privacy & Policy
  • Posted by:
    Trend Micro
0

Defense contractor Lockheed Martin recently revealed that last week it suffered a brief, albeit unnerving, cyber attack to one of its information systems networks.

Read More
Tags: cybercrime

Expert: Smartphone location tracking may bolster enterprise security

  • Posted on:May 31, 2011
  • Posted in:Mobility, Spotlight
  • Posted by:
    Trend Micro
0

Smartphone location tracking has been the subject of much controversy recently, but, according to one expert, businesses may be able to use this capability to improve their data security practices.

Read More
Tags: Privacy

Federal networks attacked 5.4 million times in 2010, DHS official says

  • Posted on:May 31, 2011
  • Posted in:Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

Even as the government attempts to deploy stricter data security measures to protect against cyber attacks, intrusions targeting federal IT networks are rampant, one official recently said.

Read More
Tags: Vulnerabilities

New Mac Defender variant more dangerous than others

  • Posted on:May 31, 2011
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

While Mac computers are commonly considered safer from viruses than Windows PCs, attacks against Apple machines are on the rise, as evident by the emergence of a new bit of malware targeting Mac users.

Read More
Tags: Vulnerabilities

Regulatory compliance does not mean greater security, study finds

  • Posted on:May 31, 2011
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

Though regulatory compliance has been a major focus as healthcare providers transition from paper to electronic health records, a new survey by GlobalSign found that many data security efforts have proven fruitless.

Read More
Tags: Compliance & Regulations

Be Your Own Detective. Stalk—Ahem—Search for Free!

  • Posted on:May 27, 2011
  • Posted in:Security
  • Posted by:
    Richard Medugno
1

By Jennifer Burns Ever wonder what happened to that best friend from grade school? You may have seen these “find who you’re looking for” or “find your lost love” advertisements popping up on your home page or your Facebook feed. People finder sites are designed, as the name claims, to help people find other people….

Read More

Bank of America loses $10 million in data breach

  • Posted on:May 27, 2011
  • Posted in:Current News
  • Posted by:
    Trend Micro
0

Bank of America recently began informing it customers of a severe data protection failure that may have cost the company more than $10 million in losses.

Read More
Tags: cybercrime

Departing employees raise security concerns

  • Posted on:May 27, 2011
  • Posted in:Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

Regardless of the circumstances, businesses need to ensure their critical information is safe when an employee leaves the company – a practice that, according to two recent reports, many organizations have failed to employ.

Read More
Tags: Vulnerabilities

Study: U.S. companies ascending to the cloud

  • Posted on:May 27, 2011
  • Posted in:Cloud Computing
  • Posted by:
    Trend Micro
0

The role of cloud computing in organizational IT is established, but still evolving, according to a recent cloud computing study.

Read More
Tags: cloud computing security
Page 1 of 1012 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.