• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for March 2015

Are You Ready for Windows Server 2003 End of Life? Trend Micro Is

  • Posted on:March 20, 2015
  • Posted in:Cloud, Cloud Security, Microsoft, Security
  • Posted by:
    Mike Smith
0

Listen to our recorded analyst webinar with ESG on preparing for Windows Server 2003 End of Life. Listen now. If you’re like thousands of other organizations in North America, you’ll currently be running Windows Server 2003. In fact, your business probably relies on it. But when Microsoft withdraws support for the platform on July 14, all bets…

Read More

The Sure Things in Life: Death, Taxes and…Scams

  • Posted on:March 20, 2015
  • Posted in:Internet Safety, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

In the United States, we are one month away from the annual tax deadline: April 15. And, while the old cliché of “There are two things you can be sure of in life — death and taxes,” still rings true, I would humbly add a new item to that list–scams. In 2009, we posted about…

Read More

The importance of vulnerability research: Recent findings

  • Posted on:March 18, 2015
  • Posted in:Cloud Computing, Current News, Current News, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Let’s examine vulnerability research, its importance and the current controversy in the sector.

Read More

Five Questions with the University of Pittsburgh

  • Posted on:March 18, 2015
  • Posted in:Security
  • Posted by:
    Laura Rojo-Eddy
0

As one of the oldest institutions of higher learning in the U.S., the University of Pittsburgh has built a reputation for breeding and developing Nobel and Pulitzer Prize winners, Rhodes Scholars, NCAA champions, and countless other accomplished students, alumni and faculty. Serving more than 700 of the university’s business support staff, the university’s Financial Information…

Read More

Companies are ramping up cybersecurity spending

  • Posted on:March 17, 2015
  • Posted in:Cloud Computing, Current News, Current News, Cybercrime, Industry News, Vulnerabilities & Exploits, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Cybersecurity last year was characterized by a sense of unpreparedness on the part of corporate giants. But this year could be different.

Read More

Skipping Work to Celebrate St. Patrick’s Day? “Unfriend” Your Boss First

  • Posted on:March 17, 2015
  • Posted in:Internet Safety, Social Media
  • Posted by:
    Shannon McCarty-Caplan
0

I love celebrating St. Patrick’s Day in Chicago. The party starts the Saturday before and doesn’t stop until the river is back to its original (less fluorescent green) color. I’m not alone! According to a poll conducted by Cint USA and Trend Micro*, almost 60 percent of respondents plan on participating in St. Patty’s Day…

Read More

Tax season security threats: TorrentLocker

  • Posted on:March 15, 2015
  • Posted in:Current News, Industry News, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

Hackers are using a ransomware sample called TorrentLocker to attack victims during tax season. 

Read More

Malicious Android App Fakes Shutdown and Allows Bad Guys to Take Control

  • Posted on:March 12, 2015
  • Posted in:Android, Security
  • Posted by:
    Richard Medugno
0

The more our lives become dependent on mobile devices like Android smartphones, the more important it is to have mobile security to protect them and our digital lives. This is not just a concern for the future, but affects many users today in ways they could never have anticipated. Recently, Trend Micro researchers found a…

Read More

No Application Is Invulnerable, Now What?

  • Posted on:March 10, 2015
  • Posted in:Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
2

Looking back at 2014, we see an abundance of vulnerabilities in Adobe Acrobat, Java, Windows, and others. The steady stream of disclosures came as a shock to no one. What was surprising was the revelation of two very significant and widespread vulnerabilities: Heartbleed and Shellshock. Heartbleed is a set of bugs in the popular open…

Read More

The challenges of cyber security education and training in 2015

  • Posted on:March 9, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
1

How should cyber security professionals be educated and trained? It’s an important question, especially at a time when many enterprises perceive a shortage of skilled professionals capable of keeping their corporate networks secure.

Read More
Page 2 of 4 ‹ 123 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.