• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for January 2015

It’s Baaacck: Ransomware Returns with a Vengeance

  • Posted on:January 29, 2015
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

The saying goes: “everything old is new again.” There’s truth to that saying when it comes to online threats. Over the past few months, our researchers have seen that ransomware is making a comeback. This is something to be concerned about because the latest versions of ransomware are very sophisticated. That means that a successful…

Read More

Breaches call attention to risk of spear phishing

  • Posted on:January 29, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

An increase in spear phishing attacks on high-profile businesses demonstrate the need for better preventative security. 

Read More

Trend Micro at VMware Partner Exchange 2015

  • Posted on:January 29, 2015
  • Posted in:Cloud, Cloud Security, Partners, Security
  • Posted by:
    Partha Panda
0

VMware and Trend Micro have a longstanding partnership, resulting in a fruitful history of security innovations to ensure the strongest protection for virtual and cloud environments. As a leading VMware security partner, Trend Micro has been proud to work with VMware to deliver the first agentless security platform architected for VMware virtualized data center, virtual…

Read More

Network detection evasion: Current threats and protection strategies

  • Posted on:January 28, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Hackers are increasingly using network detection evasion strategies, which typically involves masking malicious network traffic so that it blends in with legitimate traffic. 

Read More

Security teams struggle to make sense of numerous malware notifications

  • Posted on:January 27, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

How can security teams make sense of thousands of malware alerts?

Read More

Cloud adoption hasn’t been slowed by cyber security concerns

  • Posted on:January 26, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

There are many viable candidates for the single biggest cliche about cloud computing – e.g., “it’s more cost-effective than on-premises IT,” or perhaps “the cloud is scalable” – but for cyber security purposes, the winner is most likely “the cloud is not secure.”

Read More

A look at mobile malware: Worst samples of 2014 and predictions for 2015

  • Posted on:January 25, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Let’s take a look back at some of the mobile malware trends that emerged in 2014 and what experts predict is in store for mobile users this year.

Read More

Healthcare cyber security set to grapple with EHR, regulation and malware in 2015

  • Posted on:January 23, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Cyber security was a top issue for healthcare CIOs and their teams in 2014, as they continued to deal with issues such as targeted attacks, mishandled and lost records and the introduction of new technologies (like cloud computing and wearables) into hospitals and clinics.

Read More

New “Zero-day” in Adobe Flash: What You Need to Know

  • Posted on:January 22, 2015
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
10

This morning, we learned of a new problem affecting Adobe’s Flash product. This is a serious situation that affects nearly everyone using Microsoft Windows. Because of that, here’s what you need to know and, most importantly, what you should do about it. What’s the problem? The problem is that there’s a newly discovered vulnerability affecting…

Read More

Endpoint Security: Protecting against the Next Generation of Attacks

  • Posted on:January 20, 2015
  • Posted in:Security
  • Posted by:
    Eric Skinner
0

Endpoint security has changed fundamentally over the past 20+ years, in many ways mirroring the evolution of the wider information security market. From the first basic anti-malware scanners of the ‘90s, through innovations in black- and whitelisting, intrusion detection, web and email filtering, and today’s sophisticated targeted attack detection products – we’ve sure come a…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.