• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for November 2011

Ask Vic – Do you know anything about iYogi?

  • Posted on:November 30, 2011
  • Posted in:Security
  • Posted by:
    Trend Micro
8

 By Vic Hargrave A Question for Vic:   Vic’s Answer: Hi, Julie.  Thanks for your question.  As you probably know, iYogi.com is an online PC support service. To check them out I first ran http://www.yogi.com through Trend Micro’s Site Safety Center http://global.sitesafety.trendmicro.com/  where you can get free URL ratings from us. Our URL rating service…

Read More

Illinois water utility attack highlights need for greater network security

  • Posted on:November 30, 2011
  • Posted in:Current News, Cybercrime
  • Posted by:
    Trend Micro
0

Earlier this month, hackers reportedly broke into a U.S. water utility computer network and destroyed a pump using a relatively simple attack.

Read More
Tags: cybercrime

Securing mobile devices in the healthcare sector

  • Posted on:November 30, 2011
  • Posted in:Privacy & Policy
  • Posted by:
    Trend Micro
0

The healthcare industry is emerging as a leading advocate for the use of smartphones and tablets in the workplace, but the sensitive nature of the data carried on these devices heightens the importance of effective mobile security practices.

Read More
Tags: Compliance & Regulations

Data security spending lags at federal agencies, IDC report finds

  • Posted on:November 30, 2011
  • Posted in:Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Much of the information produced and stored on the networks of U.S. government agencies holds the key to national security and the country’s operations.

Read More
Tags: Vulnerabilities

Fragmentation may prove fatal for Anonymous (op/ed)

  • Posted on:November 30, 2011
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

The fragmented, leaderless nature of Anonymous may lead to the cybercriminal collective’s ultimate undoing.

Read More
Tags: Current News

Despite security concerns, businesses moving to the cloud (Op/Ed)

  • Posted on:November 30, 2011
  • Posted in:Cloud Computing, Current News
  • Posted by:
    Trend Micro
0

Many businesses are still not comfortable with the idea of storing sensitive and mission-critical data in the cloud, even as more experts claim that cloud-based services can provide equal, if not better, data protection than most on-premise solutions.

Read More
Tags: cloud computing security

What role does the CFO play in data security strategies?

  • Posted on:November 30, 2011
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

Traditionally, the responsibility of protecting company information has fallen on the chief information officer and the IT department.

Read More
Tags: Current News

Sutter Health sued for $1 billion following data breach

  • Posted on:November 30, 2011
  • Posted in:Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

A group of patients filed a class-action lawsuit against Sutter Health this week, after it was revealed a laptop containing information on more than 4 million patients was stolen from the headquarters of the Sutter Medical Foundation (SMF) in Natomas, California.

Read More
Tags: Privacy

Third quarter data security: Mobile, sophisticated attacks persist

  • Posted on:November 29, 2011
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

Hackers are targeting their cyberattacks to exploit various vulnerabilities, resulting in malware infections, data breaches and persisting news headlines that highlight the current state of affairs for cybersecurity.

Read More
Tags: Internet Safety

Leveraging virtualization for tighter security

  • Posted on:November 29, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
0

Efficiency, scalabality and affordability have traditionally been the primary business drivers for data center virtualization. However, if managed correctly, companies may soon discover the true benefit of the technology is actually enhanced security.

Read More
Tags: virtualization
Page 1 of 612 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.