• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for September 2014

Celebrity photo hack puts spotlight on cloud security

  • Posted on:September 30, 2014
  • Posted in:Cloud Security, Current News, Industry News, Privacy
  • Posted by:
    Trend Micro
0

A recent targeted attack on celebrity accounts has shone the spotlight on cloud security.

Read More

Gmail, LinkedIn and the ongoing security issues with email

  • Posted on:September 28, 2014
  • Posted in:Current News, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Email isn’t going away, so securing it should continue to be a top cybersecurity priority.

Read More

Deep Discovery – Alerting you to Shellshock exploits

  • Posted on:September 26, 2014
  • Posted in:Security
  • Posted by:
    Kevin Faulkner
0

Today we are releasing new Deep Discovery rules to detect attacks attempting to exploit the recently exposed Shellshock (CVE-2014-6271 and CVE-2014-7169) vulnerability. Shellshock Risks This vulnerability represents an important and widespread risk to organizations of all sizes. It is found in Bash, the dominant shell for Unix and Linux, and can also be found in…

Read More

Malware moving beyond Windows

  • Posted on:September 26, 2014
  • Posted in:Current News, Cybercrime, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Malware is a becoming a bigger issue on platforms other than Microsoft Windows.

Read More

The Shellshock vulnerability, aka the “Bash Bug”

  • Posted on:September 25, 2014
  • Posted in:Security
  • Posted by:
    Trend Micro
1

Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at the latest vulnerability the “Bash Bug.” We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. Please add your thoughts in the comments below and follow…

Read More

What You Need To Know About Shellshock, aka the “Bash Bug”

  • Posted on:September 25, 2014
  • Posted in:Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
2

The Bug This week brings us another wide spread, critical vulnerability that required immediate attention. Perhaps even larger in scope than Heartbleed, Shellshock affects a very common open source program called “bash.” Bash is a command shell commonly deployed on Linux, BSD, and Mac OS X. CVE–2014–7169 provides the details. The tl:dr takeaway is this bug is widespread, has…

Read More

SMB vulnerabilities overlooked in focus on big retail breaches

  • Posted on:September 25, 2014
  • Posted in:Current News, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

SMBs are highly exposed to data breach risk, but are easy to overlook in the current fixation on big retail breaches.

Read More

Cyber Security: Does It Put You in a New York State of Mind?

  • Posted on:September 23, 2014
  • Posted in:Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

I love this classic Billy Joel song.  It always pops into my head whenever I am flying into and out of the bustling city.  Last week the tune again weaved its way into my subconscious as I had the privilege of speaking to nearly 500 cyber security professionals at the Cyber Security Summit in NYC. …

Read More

Why banks are turning to the cloud

  • Posted on:September 19, 2014
  • Posted in:Cloud Security, Data Privacy, Industry News
  • Posted by:
    Trend Micro
0

There are a number of advantages that are causing the financial world to turn to the cloud, including the ability to more quickly serve clients and improve relationships with them. 

Read More

Celebrity Exposures in the Cloud

  • Posted on:September 18, 2014
  • Posted in:Security
  • Posted by:
    Vic Hargrave (Software Architect)
0

When I heard that hackers ripped off nude photos of celebrities by hacking into their iCloud accounts then posted them on the dodgy image board AnonIB, I can’t say that I was surprised. Even though storing data this sensitive in the cloud seems like a risky practice, I am sympathetic with the sense of embarrassment these…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Skimming and Phishing Scams Ahead of Black Friday and Polish Hacking Team Wins Capture the Flag Competition
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.