• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for October 2012

Fear Factors

  • Posted on:October 31, 2012
  • Posted in:Cybercrime
  • Posted by:
    Richard Medugno
1

Read More

Don’t Let BYOD become BYOV (Bring your own viruses)

  • Posted on:October 31, 2012
  • Posted in:Mobility
  • Posted by:Christopher Budd (Global Threat Communications)
0

Instant Messaging worms are nothing new. These first showed up on the scene back in the mid 2000’s as instant messaging applications started making inroads in the enterprise. Back in those days, people were starting to run AOL Instant Messenger, Windows Live Messenger, or Yahoo! Messenger on their work machines while logged into their personal…

Read More
Tags: BYOABYODconsumerizationenterprise-securitymalwareSkypethreatworm

Google, Microsoft, Yahoo fix email encryption flaw while others remain vulnerable

  • Posted on:October 29, 2012
  • Posted in:Current News
  • Posted by:
    Trend Micro
0

A recently exposed weakness in a major email encryption standard has prompted several companies to update their messaging platforms, and a government advisory has urged others to do the same.

Read More
Tags: Current News

For data protection, think beyond the device

  • Posted on:October 26, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

As the BYOD (Bring your own Device) policies grow in popularity, handling security for employee-owned smartphones and tablets continues to provide a major complication for organizations.

Read More
Tags: Mobility

Microsoft: Cybercriminals prey on bargain hunting browsers

  • Posted on:October 26, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

One of the key trends identified by Microsoft Internet security researchers involved users downloading software key generators (KeyGens) that effectively crack or unlock licenses to permit free use beyond initial trial periods.

Read More
Tags: web threats

Hackers steal personal data, $400,000 in municipal attack

  • Posted on:October 26, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

A recent data breach in the city systems of Burlington, Washington resulted in the electronic theft of more than $400,000 from a city bank account, as well as the corruption of financial data for hundreds of employees and residents.

Read More
Tags: cybercrime

FTC promotes ‘privacy by design’ for facial recognition technologies

  • Posted on:October 26, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

The Federal Trade Commission issued a new report detailing recommended best practices for balancing innovation and data protection when working with facial recognition technologies.

Read More
Tags: Reports

Cybercrime target selection becoming a popularity contest

  • Posted on:October 24, 2012
  • Posted in:Cybercrime, Spotlight
  • Posted by:
    Trend Micro
0

By studying which devices, websites, searches and transactions are most popular at any given time, they are better positioned to design economical attacks that generate larger returns from smaller investments of their time and skill.

Read More
Tags: ReportsUnderground Economy

Getting smart about cloud security

  • Posted on:October 24, 2012
  • Posted in:Cloud Computing
  • Posted by:
    Trend Micro
0

Security fears continue to stall cloud adoption at the enterprise level, but workers are embracing cloud solutions regardless of IT fears.

Read More
Tags: Cloud Security

OpEd: Microsoft policy change exposes data privacy discrepancies

  • Posted on:October 24, 2012
  • Posted in:Privacy & Policy
  • Posted by:
    Trend Micro
0

As a result of the lack of standardization and unification in the realm of data protection policy development and enforcement, double standards and unclear expectations are frustrating companies and potentially endangering consumers.

Read More
Tags: Data Privacy
Page 1 of 912 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.