• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for February 2016

Internet of Things — or Internet of Cyber Crime?

  • Posted on:February 29, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
2
The Internet of Things needs effective cyber security solutions, too.

There are several important ways the IoT is behind in terms of cyber security. Targeted attacks against devices within the IoT are still entirely possible.

Read More

Uber data breach shows apps may not be able to protect your information

  • Posted on:February 29, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Are your apps as secure as you think they are?

Making sure to stay on top of software updates is a cyber security necessity.

Read More

Keeping Your Sanity Securing IaaS, PaaS, and SaaS Cloud Services – Part I

  • Posted on:February 29, 2016
  • Posted in:Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Defending multiple cloud service types as one

In most organizations today, cloud services are a fact of life. Whether you’re deploying and managing servers in the cloud, building on top of a globally distributed platform, or consuming constantly updated services, the cloud is a fundamental part of your IT service delivery…whether you know it or not. And why wouldn’t you move to…

Read More
Tags: Cloud SecurityCSAIT Strategy

California Auditor General calls out SANS Top 20 as a good path to more secure data

  • Posted on:February 29, 2016
  • Posted in:Business, Cloud, Cloud Security
  • Posted by:
    Steve Neville
0

We live in interesting times—or, if you are the victim of a data breach, maybe you don’t really feel that way! For the past several years there have been continuous ‘expert’ statements like “this is the year of the data breach” … and yet we continue to have major incidents in the news regularly. In…

Read More

Trend Micro at RSA 2016: Taking the Fight to the Hackers

  • Posted on:February 28, 2016
  • Posted in:Business, Internet Protection, Security
  • Posted by:Raimund Genes (Chief Technology Officer)
0

There’s a great scene in the 2012 Bond film Skyfall where M is trying to persuade a panel of cynical politicians of the need for her beloved ‘00’ Section: “I’m frightened because our enemies are no longer known to us. Our world is not more transparent now, it’s more opaque.” She could quite easily be…

Read More

Those software updates are more important than you think

  • Posted on:February 26, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Microsoft is ending support for old versions Internet Explorer.

Making sure to stay on top of software updates is a cyber security necessity.

Read More

Looking for love in all the wrong places: Hackers go after online dating

  • Posted on:February 26, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
That's not cupid's malware in your computer.

Bachelors and bachelorettes have a new cyber threat vector to watch out for: Online dating sites and “hookup” apps.

Read More

Ads on websites are dangerous to more than your sanity

  • Posted on:February 26, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Hackers have found a new way to infect your computer: advertising.

Trend Micro Antivirus + Security 10 can help you avoid dangerous websites.

Read More

This Week in Security News

  • Posted on:February 26, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Using Trend Micro Security’s Privacy Scanner – Part 1: Social Network Privacy

  • Posted on:February 25, 2016
  • Posted in:Consumer, Privacy, Security, Social Media
  • Posted by:
    Michael Miley
0

Many users of social networks don’t realize their identity data can be compromised when the privacy settings in their account are too lax. On Facebook, for example, you can determine who can see your stuff (for future posts, things you’re tagged in, and so on); who can contact you (friends, friends of friends, or everyone);…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.