• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for August 2014

Crocodile Tears: A Look at Turning the Tables on Cyber Attacks

  • Posted on:August 13, 2014
  • Posted in:Security
  • Posted by:Tom Kellermann
0

In Africa, crocodiles are considered to be the most fearsome predators. These ancient beasts are superb hunters because of their strength and hunting tactics. One of those tactics involves the stalking of watering holes in the savanna. This method of tactic is implemented because the wildebeests and gazelles congregate at watering holes. This tactic is…

Read More

Extend Your Virtualized Data Center to the Cloud with Ease

  • Posted on:August 12, 2014
  • Posted in:Cloud, Cloud Security, Security
  • Posted by:
    Mike Smith
0

                Cloud-based applications have continued to grow exponentially. The majority of people are now interacting with cloud-based data and applications in one way or another, likely through social media such as Facebook, LinkedIn, etc. This comfort level is extending to business applications as well. IT and security professionals…

Read More

Data Breaches, Vulnerabilities, and Online Banking Malware: Trend Micro’s 2Q 2014 Security Roundup

  • Posted on:August 12, 2014
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

  Attack trends in 2014 are shaping up to bring data breaches, vulnerabilities and online banking malware to the forefront. In ourĀ 2Q 2014 Security Roundup Report: Turning the Tables on Cyber AttacksĀ our research shows these are the most notable and important security and privacy events of the year. Data breaches in particular are moving from…

Read More

An Important Day in Internet History – Google including SSL use in ranking algorithm

  • Posted on:August 8, 2014
  • Posted in:Security
  • Posted by:
    Chris Bailey (General Manager, Trend Micro SSL)
0

In 20 years from now, Google’s announcement that it will give priority ranking to SSL-enabled sites, will be seen as a key milestone that catalyzed a change in most (if not all) traffic on the Internet. On August 6th, Google announced a change to its ranking algorithm, stating that it will now include the use…

Read More

Is it safe to store data in the cloud?

  • Posted on:August 8, 2014
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Cloud storage remains an obstacle to enterprise security and compliance.

Read More

Increase in APTs: Symptoms and protection strategies

  • Posted on:August 8, 2014
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Since their initial discovery, advanced persistent threats have earned their name.

Read More

Trend Micro Deep Discovery Receives a White Hat at BlackHat

  • Posted on:August 7, 2014
  • Posted in:Security
  • Posted by:
    Bob Corson
0

In a world of advanced targeted attacks, stationary security budgets and determined, well-resourced cyber foes, the security software you choose can have a major impact on your organization’s bottom line. Effective detection is a critical success factor to any organization seeking to protect their data, intellectual property and communications. That’s why we’re thrilled that NSS…

Read More

Big Changes Coming for Organizations that rely on TLS/SSL Certificates for Internal Domain Names

  • Posted on:August 7, 2014
  • Posted in:Security
  • Posted by:
    Chris Bailey (General Manager, Trend Micro SSL)
0

SSL – the encryption of communications using digital certificates – is a fundamental building block on the Internet to enable trusted transactions. If your organization currently uses Internal Domain Names and you secure these sites with SSL certificates from a public Certification Authority (CA), then you will need to make some significant changes to your…

Read More

Latest information about the Russian Hackers Said to Loot 1.2 Billion Internet Records

  • Posted on:August 6, 2014
  • Posted in:Security, Underground Economy
  • Posted by:
    Trend Micro
0

Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this data breach. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. August 8, 2014 IT Nation(a Luxembourg online IT…

Read More

Victim Insights around the Russian Hack

  • Posted on:August 6, 2014
  • Posted in:Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

The recently disclosed Russian hack in which a Russian cyber gang stole billions of passwords from both commercial websites and consumers highlights the challenges we all face in our day to day activities on the web. Cyber thieves are targeting us all in their quest to make money and as we’ve talked about before, the…

Read More
Page 3 of 4 « ‹ 234 ›

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.