• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for January 2013

Cybercriminals taking aim at security vendors

  • Posted on:January 30, 2013
  • Posted in:Compliance & Regulations, Cybercrime
  • Posted by:
    Trend Micro
0

Most computers have some kind of security program or toolkit in an effort to help with data security and protection, but what happens when the software or manufacturer or this software becomes infected?

Read More
Tags: Compliance & Regulationscybercrime

That Legal Notice You Got From Facebook? It’s Legit

  • Posted on:January 29, 2013
  • Posted in:Cybercrime
  • Posted by:
    Richard Medugno
0

By TrendLabs Cybercriminals have been taking advantage of Facebook’s popularity ever since it became huge. Phishing scams, malicious spam, survey scams, profile hijackers – Facebook is one of cybercrime’s biggest and juiciest targets, and they’ve used it for every kind of lure imaginable. As such, you may have been suspicious if you got a legal…

Read More

Opting out of data collection should be user choice

  • Posted on:January 29, 2013
  • Posted in:Compliance & Regulations, Privacy & Policy
  • Posted by:
    Trend Micro
0

In an effort to help increase mobile data protection, a CIO.com reports that one U.S. representative has proposed a new law that would allow users to ask apps to not collect their data and tell them to delete past information that has been collected.

Read More
Tags: Compliance & RegulationsData Privacy

Risk analysis important for proactive data security

  • Posted on:January 28, 2013
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

While fighting back against hackers and other cybercriminals trying to infiltrate a business may not be the best route, according to Michael Davis on InformationWeek, it is important for companies to be able to have a method of data protection in place that works well.

Read More
Tags: cybercrimeData Privacy

With Friends Like Ronaiah Tuiasosopo…

  • Posted on:January 25, 2013
  • Posted in:Social
  • Posted by:
    Richard Medugno
0

By Richard Medugno Okay, so if you haven’t heard about the Internet hoax involving the Notre Dame linebacker and Heisman Trophy finalist Manti Te’o , then you just haven’t been in America or you haven’t been paying attention. Here is a brief synopsis of the “scandal”. Manti fell for a girl he met online named…

Read More

‘BYO’ moves beyond the device

  • Posted on:January 24, 2013
  • Posted in:Compliance & Regulations, Mobility
  • Posted by:
    Trend Micro
0

Any company that has large groups of employees has likely noticed, it is nearly essential to have a BYOD (Bring your own Device) policy in place, as people are bringing smartphones, tablets, e-readers and more to work every day now.

Read More
Tags: Compliance & RegulationsMobility

Mobile malware to gain steam in 2013

  • Posted on:January 24, 2013
  • Posted in:Cybercrime, Mobility
  • Posted by:
    Trend Micro
0

Trend Micro recently released Repeating History and Evolved Threats in a “Post-PC” World, which examines the threats of the mobile landscape and beyond. These reports both showed that there are currently 350,000 mobile threats and that is expected to grow far beyond where it is.

Read More
Tags: cybercrimeMobility

Java may still be dangerous

  • Posted on:January 22, 2013
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Companies can work as hard as they want to protect Internet security, but outside flaws from programs could end up taking everything down within seconds. This is one issue companies need to look at with Oracle Corporation’s Java software, which was shown to have a flaw that caught the attention of the Department of Homeland Security.

Read More
Tags: cybercrimePrivacy & Policy

Privacy concerns raised in genetic information study

  • Posted on:January 22, 2013
  • Posted in:Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

An anonymous genealogy registry may not be as private as many had hoped, as Dan Vergano wrote on USA Today that a report has identified 12 percent of the men in this publicly available record of genes.

Read More
Tags: Current NewsData PrivacyPrivacy & Policy

What Are Zero-Day Exploits?

  • Posted on:January 21, 2013
  • Posted in:Security
  • Posted by:
    Trend Micro
0

By Vic Hargrave There has been a lot discussion on the Internet recently about the Java 7 zero-day exploit, which has affected many computers worldwide. But what exactly is a zero-day exploit and how does it differ from other types of threats?

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.