• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for December 2014

Looking back on 2014’s worst data breaches

  • Posted on:December 30, 2014
  • Posted in:Current News, Cybercrime, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

A look back at some of the worst breaches of the past year

Read More

Looking back at mobile malware and Web attacks from 2014

  • Posted on:December 29, 2014
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Malware, at least as an idea, has a long history, and it continued to evolve in 2014.

Read More

US government increases attention on cyber security

  • Posted on:December 22, 2014
  • Posted in:Compliance & Regulations, Current News, Cybercrime, Industry News, Privacy & Policy, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

As 2014 comes to a close and government business winds down for the year, one thing was made very clear: cyber security is going to play a major role in 2015.

Read More

The reality of the Sony Pictures breach

  • Posted on:December 22, 2014
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
2

Over the last few weeks, the data breach of Sony Pictures has become one of the biggest cybersecurity stories of 2014. But how big was it?

Read More

Trend Micro Consumer Security is the Sole Leader in Real-World Testing Done by Independent Organization

  • Posted on:December 22, 2014
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

AV-Comparatives is an independent, not-for-profit organization based in Innsbruck, Austria. They do real-world testing of antivirus software. Their main goal is to systematically check to see if the leading security solutions for PC, Mac, and mobile devices are “living up” to advertised promises. Trend Micro and almost every other major security vendor participates in the…

Read More

The Ultimate Goal of Digital Attacks

  • Posted on:December 17, 2014
  • Posted in:Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

For the final blog post in the series supporting the release of our Q3 Threat Roundup “Vulnerabilities Under Attack” I was asked to write “an analysis of security challenges faced by users.” Fortunately I have the source material of the Threat Roundup to stick to because really, that’s a subject deserving of a series in…

Read More

Advanced Threat Protection: Making Your Business Case

  • Posted on:December 17, 2014
  • Posted in:Security, Uncategorized
  • Posted by:
    Bob Corson
0

We all know the attention data breaches are generating. Yet what appears to be lacking in the dialogue about targeted attacks and advanced threats are the impacts that can result, and therefore, how to frame a business case. As an example, according to a recent study published by PWC, the average cost of a data…

Read More

Thousands of WordPress sites with malware highlight need for comprehensive security

  • Posted on:December 17, 2014
  • Posted in:Current News, Cybercrime, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0
End-to-end encryption has only really been rolled out to many major messaging platforms.

While everyone was worrying about the holiday influx of POS malware, a cybercriminal group quietly exploited a plug-in vulnerability with the mysterious SoakSoak malware and infected at least 100,000 sites utilizing WordPress’s content management system. Researchers with security firm Sucuri discovered the malware campaign in mid-December, noting that it leveraged a flaw within a Slider Revolution plug-in that was…

Read More

WSCED: Top 5 Online Holiday Safety Tips for Cousin Eddie

  • Posted on:December 16, 2014
  • Posted in:Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

What Should Cousin Eddie Do? By now, I am sure many of you have watched National Lampoon’s Christmas Vacation multiple times, shared quotes on Twitter and Facebook, and were even inspired to demonstrate everything you know about exterior illumination. Check out the actual trailer from the way-back-when machine in 1989.  I think we can all…

Read More

Network Security: No need to drop, cover, and hold on

  • Posted on:December 16, 2014
  • Posted in:Network, Security
  • Posted by:
    TJ Alldridge
0
Open-source malware presents challenges to companies and individuals alike.

Growing up in the Silicon Valley, we would do “drop, cover, and hold on” earthquake drills in school so we were prepared when the big one hit. Not if, but when. When you live on the San Andres Fault, earthquakes are going to happen. The same can be said for advanced threats and targeted attacks….

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.