• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for November 2012

Security is not the only barrier to cloud adoption

  • Posted on:November 30, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

In his 90 minute keynote address at the AWS re:Invent conference, Andy Jassy quite unabashedly gave these reasons for using AWS versus a private cloud, (at the 32 minute mark) :   So public cloud adoption should be a no-brainer, right? Oh wait, but Andy omitted security in the public cloud – how can I trust…

Read More
Tags: amazon web servicesAndy JassyAWScloud computingCloud SecurityPublic Cloud

Scientists find new, less expensive method to secure Internet

  • Posted on:November 29, 2012
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

A new technique that offers a less expensive way of making sure a data security solution is in place has been discovered by scientists from Cambridge University and Toshiba, according to The New York Times.

Read More
Tags: cybercrimePrivacy & Policy

High-tech scams mar holiday season

  • Posted on:November 29, 2012
  • Posted in:Cybercrime, Mobility
  • Posted by:
    Trend Micro
0

If a deal seems too good to be true, it usually is. Yet many people seem to put this wisdom to the side when they enter the holiday shopping season.

Read More
Tags: cybercrimeMobility

NASA looking to ramp up security after laptop is stolen

  • Posted on:November 29, 2012
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

According to Datamation, all employees will now be required to have their laptops fully encrypted, as the agency said in a memo that the stolen laptop contained unencrypted employee personal information.

Read More
Tags: cybercrimePrivacy & Policy

PCI offers new tips for risk assessments

  • Posted on:November 29, 2012
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

PCI has released some updated guidelines and tips for risk assessments going forward.

Read More
Tags: cybercrimePrivacy & Policy

Security in the cloud is a shared responsibility

  • Posted on:November 28, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
2

When you host applications in the public cloud, you assume partial responsibility for securing the application. The cloud provider, for example Amazon Web Services (AWS), secures the physical data center (with locked badge entry doors, fences, guards, etc.) in addition to securing the physical network with perimeter firewalls. This is no significant change from how…

Read More
Tags: amazon web servicesAWScloudCloud Securitysecurity

What Are Man-in-the-Middle Attacks and How Can I Protect Myself From Them?

  • Posted on:November 28, 2012
  • Posted in:Security
  • Posted by:
    Trend Micro
4

By Vic Hargrave In my October 23 blog, I mentioned that iOS 4.3.4 was susceptible to a man-in-the-middle attack that was later corrected in iOS 4.3.5. These attacks are frequently mentioned in the security literature, but many of you may still be wondering what they are exactly and how they work. With this article, I’ll…

Read More

Spear Phishing and Advanced Targeted Attacks

  • Posted on:November 28, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
1

As the saying goes, everything old is new again. Spear phishing may be a timeworn technique, but it continues to be effective even in today’s Web 2.0 landscape. In modern hacking, the practice is finding resurgence as an infiltration method for advanced targeted attacks. Recent research shows that spear phishing is now the #1 method of…

Read More
Tags: Advanced Persistent Threatsadvanced targeted attacksAPTscustom defensecyber crimeemail infiltrationemail securityspear phishing

The Pirate Bay: First Ever Working Redundant Array of Inexpensive Clouds?

  • Posted on:November 27, 2012
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

It’s really interesting to see that the Pirate Bay just found a new reason to get rid of its physical servers in exchange for moving to the cloud. Sure, lots of companies have made the move from physical servers to virtual servers to cloud, but it’s ironic that The Pirate Bay is inadvertently leading the…

Read More
Tags: Ambient clouddatacenterphysical serversPublic CloudRAICredundant array of inexpensive cloudstech newsThe Pirate Bayvirtual servers

Companies must assess the credentials of DLP solutions

  • Posted on:November 23, 2012
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Dark Reading contributor Jared Thorkelson believes it is important that companies know exactly what they’re getting when vetting a potential data loss prevention solution

Read More
Tags: cybercrimePrivacy & Policy
Page 1 of 512 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.