• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for August 2013

Mobile Privacy Tip #2 – Don’t speak too loudly in public

  • Posted on:August 30, 2013
  • Posted in:Mobility
  • Posted by:
    Greg Boyle
0

Mobile phones and in particular smartphones have been a revelation with regards to staying in touch when we are out and about. I was walking through Darling Harbour in Sydney last weekend with my family and we noticed something truly astonishing, of the 20 or so people sitting around us every single one of them…

Read More

“Talking” cars and Crash Prevention: Thumbs up or Risky Venture?

  • Posted on:August 29, 2013
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

In keeping with our research into the Internet of Everything, I wanted to look more in depth at the question “what could possibly go wrong” in regards to a recent proposal by the United States Transportation Safety Board (NTSB) calling for vehicles to be able to wirelessly “talk” with one another to help prevent crashes….

Read More

Tomorrow’s IT workers already trying to ensure mobile privacy

  • Posted on:August 29, 2013
  • Posted in:Industry News
  • Posted by:
    Trend Micro
0

The most radical changes to corporate environments may ultimately emanate not from mobile devices themselves, but from the novel notions of privacy, communications and work/life balance that constant connectivity and inexpensive apps have imbedded in employees.

Read More

Are you “Trend Ready” to Protect Data in the Cloud?

  • Posted on:August 28, 2013
  • Posted in:Cloud, Security
  • Posted by:
    Marcia Sequeira
0

One year ago, we established a first-of-its-kind testing program known as “Trend Ready for Cloud Service Providers,” which verifies the compatibility of cloud service providers with our industry-leading cloud security solutions. What does this mean and why does it matter?

Read More

The State of Cloud Security in APAC

  • Posted on:August 27, 2013
  • Posted in:Cloud, Security
  • Posted by:
    Dave Asprey
0

The reason so many people attended the talk is that there are fundamental questions over the cloud model in APAC. Last year, at the same conference, many of the questions and comments from IT executives in China focused on the ROI and deployment cloud computing itself. Since then, a lot of technology infrastructure has moved to the cloud, but it also pull the business processes along with it so that the business processes themselves are spread across the cloud. IDC estimates that cloud computing has generated 14 million jobs worldwide and innovation result from cloud could produce $1.1 trillion a year in new business revenues. That’s why this year, it seems like the general consensus in APAC is…

Read More

US surveillance casts scrutiny on encrypted email, cloud services

  • Posted on:August 27, 2013
  • Posted in:Industry News
  • Posted by:
    Trend Micro
0

Fallout from revelations about the NSA’s Internet surveillance programs has particularly impacted providers of encrypted email and cloud computing in the U.S.

Read More

The Internet of Everything: What Could Possibly Go Wrong?

  • Posted on:August 27, 2013
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

The exciting thing about being in the technology industry is that every few years there’s a new area of huge innovation that seems to upset the established order, create previously unconceivable possibilities, and change life for the better. In the 1990s and early-mid 2000s, it was the Web and connecting PCs and Macs to the…

Read More

Still running Windows XP? For peace of mind, why not upgrade to a new PC this Winter?

  • Posted on:August 26, 2013
  • Posted in:Industry News, Security
  • Posted by:Christopher Budd (Global Threat Communications)
17

More than 12 years after Windows XP shipped, Microsoft’s longest-lived and most successful version of Windows is being retired. If you’re still running Windows XP, even if you love it, you need to start making plans to say good bye to it. In the spring of 2014, it will be downright dangerous to use it.

Read More

Because “they” say so…

  • Posted on:August 25, 2013
  • Posted in:Security
  • Posted by:
    Jennifer Hanniman
0

Recently, I have shared some ideas on what to look for in a security solution for your cloud and data center. I highlighted what Trend Micro has to offer to ensure your security requirements are covered. I discussed what security smarts  to look for, and how it is possible to have complete security coverage that’s…

Read More

Security, your cloud and data center environment – does it fit like a glove?

  • Posted on:August 23, 2013
  • Posted in:Security
  • Posted by:
    Jennifer Hanniman
0

We know that architecting your virtual data center or cloud environment is not easy…as you build your environment, you are looking for those important components to fit together. Security is just one of those components – a critical piece of course! – but it is just one part and it needs to fit with the…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.