• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for May 2015

How cyber attacks can spell serious harm for critical infrastructure

  • Posted on:May 30, 2015
  • Posted in:Industry News, Privacy & Policy, Vulnerabilities & Exploits
  • Posted by:Christopher Budd (Global Threat Communications)
0

Cyber attacks have the potential to significantly disrupt national critical infrastructures, which could be catastrophic. 

Read More

Have you been the victim of an APT?: Identifying and protecting against an attack

  • Posted on:May 29, 2015
  • Posted in:Current News, Industry News, Spotlight
  • Posted by:Christopher Budd (Global Threat Communications)
0

Oftentimes, even the most extensive security systems are unable to identify and alert key employees to the presence of an APT. Therefore, IT administrators and engineers must understand what to look for in order to effectively recognize the launch of an APT, or an existing one within the network.

Read More

Career Sites Targeted by Phishing Schemes

  • Posted on:May 29, 2015
  • Posted in:Cybercrime, Industry News, Spotlight
  • Posted by:
    Trend Micro
0

Career websites have become natural targets for cyber criminals because they receive so much traffic.

Read More

Protect Your Net: Shared Security Responsibility in the Cloud

  • Posted on:May 29, 2015
  • Posted in:AWS, Cloud, Cloud Security, Microsoft, Public Cloud, Security
  • Posted by:
    Dawn Smeaton
0

It’s no secret why businesses small and large continue to move workloads to the cloud. The agility and flexibility it provides, combined with the ability to focus on their business versus running a data center means companies are now asking, “what can’t I move to the cloud” versus, “what can I?” And now that you’re…

Read More

Punishing cyber criminals: What do they deserve?

  • Posted on:May 29, 2015
  • Posted in:Cybercrime, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Punishing cyber crime is about two things: Holding the guilty accountable, and deterring others from following suit. 

Read More

This Week in Security News

  • Posted on:May 29, 2015
  • Posted in:Current News
  • Posted by:
    Gavin Donovan
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Creating a Malware Database: The Ultimate Protection

  • Posted on:May 28, 2015
  • Posted in:Cybercrime, Industry News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

As the threat landscape grows, many are wondering why a database doesn’t exist for malware samples.

Read More

The IRS Hack: What it means and what it means for you

  • Posted on:May 27, 2015
  • Posted in:Data Privacy, Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

Add the United States Internal Revenue Service (IRS) to the list of recent large scale data breaches. With their announcement on May 26, 2015 that more than 100,000 U.S. taxpayers’ information was illegally accessed through the “Get Transcript” web application, the IRS has joined Target and others in the ranks of large scale data breach victims….

Read More

For critical infrastructure, cyber security training is key

  • Posted on:May 27, 2015
  • Posted in:Cybercrime, Industry News, Mobility, Vulnerabilities & Exploits, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Our nation’s critical infrastructure is an arena where security is absolutely imperative.

Read More

How Much Do We Value Security and Privacy on Social Media?

  • Posted on:May 27, 2015
  • Posted in:Consumer, Internet Safety, Security, Social Media
  • Posted by:
    Jon Clay (Global Threat Communications)
1

How concerned about privacy and security are you when using your favorite social media sites? If you had to choose, would you prioritize one over the other? Such questions might never cross the mind of normal netizens. Yet with data breaches, identity theft, and the sharing of personal information by service providers on the rise,…

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNÂŽ Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.