More than any type of sensitive data, transactional and payment card information is actionable. Both legitimate and malicious actors have devoted enormous resources to collecting data such as credit card numbers, as well as information about buying habits and histories.Read More
A recent zero-day exploit in Microsoft Windows and Office may have affected more users than previously thought. The loophole allows attackers to take over PCs via malicious Word document email attachments. After a machine is infected, it can be remotely controlled, as if the exploit’s perpetrators were logged-on to it.
To be cyber savvy or not to be cyber savvy? There’s no question. You have to be. It’s a mad, mad, mad cyber world out there and being savvy is really a must in this age of “Internet everywhere.”Being cyber savvy is more than just being tech savvy. Devices and software have gotten so friendly…Read More
Identify theft happens when your personal information is stolen by one or more cyber criminals then used to impersonate you. More often than not this is done to gain access to your credit card data, bank accounts, and social networks to steal money from you. Along the way thieves may also harvest other data from…Read More
As we approach the winter holidays and the final weeks of 2013, two things have come together recently that underscore the dangers everyone faces now to their personal information. These events highlight that we’re increasingly in a world where best practices for everyone now needs to include real time identity theft monitoring. First, our CTO,…Read More
Trend Micro has always been a supporter of making the world a better place and we believe that giving back is a great way to make a difference. Because of this, we are sponsoring 12 U.S. Olympic hopefuls from Flying Ace Productions, to help fund their training for the 2014 Winter games in Sochi, Russia…Read More
Many of you will instantly recognize the opening line to one of the most popular Sci-Fi shows of all time, The Twilight Zone. Others of you, many much younger than the author of this blog, will most likely not have a clue to what I am referring to. All is well however! You can get…Read More
There is another Internet out there, one that everyday users never get involved with. It is used for any number of reasons, some of them legal, some of them distinctly not. A citizen of a repressive regime may wish to find a way to communicate free from state interference, or a national security agent may…Read More
The phrase “perfect storm” is overused in our field; only “digital Pearl Harbor” is more overused in my experience. This is a problem because when the conditions that merit this phrase do occur, we can be slow to respond appropriately because we tune out the phrase. As we outlined in our predictions for 2014, “Blurring…Read More
The emerging Internet of Everything is set to heighten the security burden for device makers, software vendors and the numerous organizations that will rely on an interconnected network of smart devices to support operations and serve customers.