• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for December 2013

Securing payment card data against identity thieves

  • Posted on:December 27, 2013
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

More than any type of sensitive data, transactional and payment card information is actionable. Both legitimate and malicious actors have devoted enormous resources to collecting data such as credit card numbers, as well as information about buying habits and histories.

Read More

Microsoft Office/Windows exploit is key component in several cybercrime campaigns

  • Posted on:December 27, 2013
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

A recent zero-day exploit in Microsoft Windows and Office may have affected more users than previously thought. The loophole allows attackers to take over PCs via malicious Word document email attachments. After a machine is infected, it can be remotely controlled, as if the exploit’s perpetrators were logged-on to it.

Read More

In the Age of “Internet Everywhere,” Being Cyber Savvy is Easy as PIE

  • Posted on:December 26, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
1

To be cyber savvy or not to be cyber savvy?  There’s no question. You have to be. It’s a mad, mad, mad cyber world out there and being savvy is really a must in this age of “Internet everywhere.”Being cyber savvy is more than just being tech savvy. Devices and software have gotten so friendly…

Read More

Protecting Yourself Against Identity Theft on the Internet

  • Posted on:December 24, 2013
  • Posted in:Security
  • Posted by:
    Vic Hargrave (Software Architect)
0

Identify theft happens when your personal information is stolen by one or more cyber criminals then used to impersonate you. More often than not this is done to gain access to your credit card data, bank accounts, and social networks to steal money from you. Along the way thieves may also harvest other data from…

Read More

It’s Time for You to Get Real Time Identity Theft Monitoring

  • Posted on:December 23, 2013
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

As we approach the winter holidays and the final weeks of 2013, two things have come together recently that underscore the dangers everyone faces now to their personal information. These events highlight that we’re increasingly in a world where best practices for everyone now needs to include real time identity theft monitoring. First, our CTO,…

Read More

Going For the Gold

  • Posted on:December 20, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:
    Trend Micro
0

Trend Micro has always been a supporter of making the world a better place and we believe that giving back is a great way to make a difference.  Because of this, we are sponsoring 12 U.S. Olympic hopefuls from Flying Ace Productions, to help fund their training for the 2014 Winter games in Sochi, Russia…

Read More

Imagine if you will… a world safe for exchanging digital information.

  • Posted on:December 19, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

Many of you will instantly recognize the opening line to one of the most popular Sci-Fi shows of all time, The Twilight Zone.  Others of you, many much younger than the author of this blog, will most likely not have a clue to what I am referring to. All is well however! You can get…

Read More

Fear of the Dark

  • Posted on:December 17, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:Rik Ferguson (VP, Security Research)
0

There is another Internet out there, one that everyday users never get involved with. It is used for any number of reasons, some of them legal, some of them distinctly not. A citizen of a repressive regime may wish to find a way to communicate free from state interference, or a national security agent may…

Read More

Windows XP and Java 6: Creating the “Perfect Storm” for Attacks in 2014

  • Posted on:December 13, 2013
  • Posted in:Security, Trend Spotlight
  • Posted by:Christopher Budd (Global Threat Communications)
0

The phrase “perfect storm” is overused in our field; only “digital Pearl Harbor” is more overused in my experience. This is a problem because when the conditions that merit this phrase do occur, we can be slow to respond appropriately because we tune out the phrase. As we outlined in our predictions for 2014, “Blurring…

Read More

Securing the Internet of Everything against surveillance and attacks

  • Posted on:December 13, 2013
  • Posted in:Spotlight, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

The emerging Internet of Everything is set to heighten the security burden for device makers, software vendors and the numerous organizations that will rely on an interconnected network of smart devices to support operations and serve customers.

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.