We parents have a tough job raising our kids. It’s our responsibility to guide our children on the road to adulthood by helping them learn how to cope with life’s challenges as they go out into the real world. At the same time we must also take care to protect them from the dangers that…Read More
CryptoLocker, an aggressive piece of ransomware that utilizes encryption, has precipitated a cybersecurity crisis, with the United States Computer Emergency Readiness Team and Britain’s National Crime Agency both issuing alerts about the unusual threat that it poses to Windows users.
Trend Micro has always been committed to helping make the world a safe place for exchanging digital information, and now we are able to continue this tradition through our partnership with the United Nations’ International Telecommunication Union (ITU). The ITU is the United Nations’ specialized agency for information and communication technologies, and its membership is…Read More
Digital cryptocurrency bitcoin has been touted by many venture capitalists, merchants and cybersecurity professionals as the next big thing in Internet technology. Unfortunately, the same things that make bitcoin an appealing alternative to dollars, yen and sterling have also put in the sites of cybercriminals.
All three eighth-generation video consoles utilize online services to a greater extent than their respective predecessors, not only for gaming but also for media consumption. They have become computers by another name, but with much of the same cybersecurity baggage. It will be critical that professionals regard them as such and work with vendors in the space to minimize risk for users.
Do you ever wonder what our society will look like years from now? Do you want to find out more about where cyber threats are headed in the future and how we should respond? Do you feel marginalized or out-of-touch with the current debate? If the answer to any of those questions is yes then…Read More
According to FBI Director James Comey, cyberattacks are beginning to represent the most serious threats to homeland security, and will likely eclipse the risk posed by traditional terror organizations in the next decade. One of the main targets is expected to be critical infrastructure, and industry leaders are taking notice. On Nov. 19, Kyle Wilhoit,…Read More
Ah, yes, the Holidays are here! For those of us who love to give but hate to shop at the mall, the Internet has been a godsend. Shopping online allows us to visit multiple e-stores and compare prices and products without have to brave the elements or put up with the insane and often mean-spirited…Read More
Leading up to AWS re:Invent 2013, I have been blogging about a hot topic – what should be on your cloud security checklist to cover off your security responsibilities when deploying in the cloud. To date, I have covered operating system and network security, data and application security, as well as the key optimizations to…Read More