• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for April 2015

What We Can Learn from the Adobe Class Action Lawsuit

  • Posted on:April 30, 2015
  • Posted in:Security, Targeted Attacks
  • Posted by:
    Bob Corson
0

This week, Adobe announced a settlement of a class action lawsuit that was filed against them as a result of a 2013 data breach. This followed a 2014 finding that Adobe’s conduct was a contributing factor to the damages sustained by the plaintiff; namely representatives of some of the three million credit or debit card…

Read More

How to deal with fake websites

  • Posted on:April 30, 2015
  • Posted in:Current News, Industry News, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

Fake websites have long been a thorn in the side of both consumers and enterprises.

Read More

BYOD security: Dealing with targeted attacks and zombie apps on mobile

  • Posted on:April 30, 2015
  • Posted in:Current News, Industry News, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

Mobile security continues to be a challenging frontier for enterprises, many of which have only recently adopted bring-your-own-device policies and are still in the process of overhauling their infrastructure, policies and network security tools accordingly.

Read More

Where to Donate Your Old Smartphone…

  • Posted on:April 30, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Richard Medugno
0

…And What to Do Before You Get Rid of It It’s time to spring clean! If you’re like me, you hate to toss a piece of hardware into the garbage. Happily, over the past couple of decades the reuse-recycle-repurpose trend has taken hold and expanded in our society. There are many ways to avoid just…

Read More

What lies beneath: The deep web and future crimes

  • Posted on:April 29, 2015
  • Posted in:Cybercrime, Encryption, Industry News, Mobility, Vulnerabilities & Exploits, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

The deep web is a haven for cyber crime.

Read More

Cyber security: The cooperation game

  • Posted on:April 29, 2015
  • Posted in:Compliance & Regulations, Cybercrime, Encryption, Industry News, Mobility, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

Cyber security calls for company cooperation.

Read More

Best Security Practices for Microsoft Azure: Locking Down Your Environment

  • Posted on:April 29, 2015
  • Posted in:Azure, Cloud, Cloud Security, Microsoft, Private Cloud, Public Cloud, Security, Virtualization
  • Posted by:
    Saif Chaudhry
1

As you probably know, moving your workloads to the cloud doesn’t mean you’re not responsible for the security of your operating system, applications and data. Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your Azure environment is secure. As the first in a series of posts on…

Read More

Privacy and Security: Why US Consumers Feel Overwhelmed in a Connected World

  • Posted on:April 29, 2015
  • Posted in:Consumer, Data Privacy, Internet of Everything, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

US consumers are more connected today than they’ve ever been. A perfect storm of powerful smart devices, mobile applications, cloud-based communication services, super-fast wired and wireless networks and social media platforms has led us to this point. It has enriched our lives and made us more productive at work. But with all these gains comes…

Read More

The risks of end-of-life software

  • Posted on:April 28, 2015
  • Posted in:Compliance & Regulations, Current News, Industry News
  • Posted by:
    Trend Micro
0

Aging software can be surprisingly hard to put out to digital pasture, which creates risks for enterprises that host critical business applications on legacy platforms.

Read More

The OAS and Trend Micro: Building a More Secure Critical Infrastructure for the Americas

  • Posted on:April 28, 2015
  • Posted in:Critical Infrastructure, Security, Targeted Attacks
  • Posted by:
    Organization of American States (OAS)
0

The Internet has without doubt transformed the way we live and work today – changing lives around the world for the better. But whenever a new opportunity arises, new threats to exploit it are quick to follow. Critical infrastructure is a growing area of concern for governments and private providers everywhere. These important systems have…

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNĀ® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.