• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for October 2013

“Cyber security is a job for everyone,” says FBI

  • Posted on:October 31, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Hey, did you forget that it is October is National Cyber Security Awareness Month? Yeah, I know the month’s almost over and it totally slipped my mind too.  But it’s not too late to celebrate it. Here are a couple of suggestions: You could maybe have “Password Strong” tattooed to your bicep. Or what if…

Read More

Do you have your security checklist for deploying on the cloud?

  • Posted on:October 31, 2013
  • Posted in:Cloud, Security
  • Posted by:
    Jennifer Hanniman
0

With AWS re:Invent 2013 right around the corner, I know many of you have the cloud on your mind.  Which makes me wonder – is security one of the cloud topics you are thinking about? Amazon Web Services (AWS) has definitely set high standards for security with its comprehensive set of administrative, physical and logical…

Read More

Silk Road exposé demonstrates potency, pitfalls of the anonymous Internet

  • Posted on:October 30, 2013
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Several recent cybercriminal busts have put The Onion Router network, and the “dark Internet” that it protects, out of the shadows and into the spotlight.

Read More

2020: the series – join the debate about our cyber future

  • Posted on:October 29, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:Rik Ferguson (VP, Security Research)
0

With the launch of episode five today we’re now over halfway through 2020: the Series, Trend Micro’s visionary online video project taking a sneak peek at how cyber-crime might evolve at the end of the decade. If you haven’t logged on yet, click through now to watch the story so far and follow the dramatic…

Read More

The peril of the UK’s offensive cyberwar capabilities announcement

  • Posted on:October 27, 2013
  • Posted in:Cybercrime, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

The U.K. recently took the international and cybersecurity communities by surprise when it admitted to developing of offensive cyberwar capabilities.

Read More

Increasingly complex IT networks require new approaches to testing

  • Posted on:October 26, 2013
  • Posted in:Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Given the complexity of virtualized technologies and cloud-based implementations, which are often amalgams of infrastructure, software and developmental tools from a variety of vendors and open source projects, it is imperative that enterprises take the time to carefully vet their networks and software. The need for thorough testing is exacerbated by the growing number of Web-based attacks and outages affecting businesses across the globe.

Read More

Vampires and Zombies and Ghosts…Oh, My!

  • Posted on:October 24, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:
    Richard Medugno
0

Happy Halloween! Ready for a really good scare? Check out our latest infographic titled “The Scariest Cyber Security Threats.” Our clever team of researchers have created this creepy artwork by comparing the traditional frightening Halloween characters with their associated cyber threats. For example, vampires compare quite well to online banking Trojans that “suck cash out of your…

Read More

Is it time to rethink your security model?

  • Posted on:October 23, 2013
  • Posted in:Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Many organizations are still supporting a security model that was developed years ago and is not reflecting the changes needed to address today’s challenges, including the changes in the threat landscape, the changes in the economics, and the need to do more with less. The threat landscape has shifted from one where outbreaks, spam and…

Read More

Affordable Care Act-related sites need an online seal program

  • Posted on:October 23, 2013
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

This week there’s a lot of talk about a “tech surge” to address issues with the healthcare.gov website. While that is to address issues specific to that site only, this focus on improvements around the Affordable Care Act’s (ACA) online experience is a good time to consider an important and necessary change to fundamentally improve…

Read More

Trend Micro’s Educational Tech Grant: turning kids into responsible digital citizens

  • Posted on:October 23, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:
    Lynette Owens
0

Technology opens opportunities for kids to access the world in ways that they may never otherwise have the ability to do. However, with the ease of sharing information online, kids often fail to see the future consequences of their present online activities, including the negative impact that irresponsible Internet use can potentially have on their…

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.