• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   Archives for March 2016

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

  • Posted on:March 30, 2016
  • Posted in:Network, Security
  • Posted by:
    Ricky Lawshae
0
How should CIOs approach cyber security in the new year?

If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security posture. Each…

Read More

Security vs SaaS: The SMB Dilemma

  • Posted on:March 29, 2016
  • Posted in:Security, Small Business
  • Posted by:
    Jonathan White
0

As the SMB marketplace evolves and becomes more competitive, businesses are looking for ways to reduce costs, improve worker productivity, and create new, sustainable business models that not only protect their existing customer base from being encroached on by competitors but also drive net-new customer recruitment. These market dynamics are forcing businesses to consider cloud…

Read More

HTTPS may not be as safe as it once was

  • Posted on:March 27, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
A vulnerability in SSLv2 poses a big threat to encryption.

A flaw in the SSLv2 protocol spells trouble for encryption.

Read More

Key takeaways from the rise of KeRanger malware

  • Posted on:March 27, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Ransomware strikes Macs for the first time.

Apple’s first-ever case of ransomware is part of an alarming trend. 

Read More

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 21, 2016

  • Posted on:March 25, 2016
  • Posted in:Network, Security
  • Posted by:
    Elisa Lippincott (TippingPoint Global Product Marketing)
0

According to Google, the word “superstition” is defined as a “widely held but unjustified belief in supernatural causation leading to certain consequences of an action or event, or a practice based on such a belief.” I consider myself rather superstitious, and you’ll often see me knocking on wood, not walking under a ladder, or making…

Read More

This Week in Security News

  • Posted on:March 25, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Keep your POS machines safe

  • Posted on:March 24, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Point-of-sale machines can be compromised by malware.

The serious consequences of having a compromised POS system can leave many businesses asking how to prevent these incidents.

Read More

Hitting the road: New cyber threats to smart cars

  • Posted on:March 23, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Cyber security is officially becoming a priority for automobile manufacturers.

Let’s review some of the newest cyber threats to Internet-connected cars.

Read More

Are your smart TVs watching you?

  • Posted on:March 23, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Smart TVs may pose security risks for users.

The days of referring to the television as the “idiot box” are coming to an abrupt end, but hackers can still make fools of smart TV users. 

Read More

Past vulnerabilities help map future threats

  • Posted on:March 23, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Staying updated about current security threats can help ensure protection for the future.

Staying updated about current security threats can help ensure protection for the future.

Read More
Page 1 of 512 › »

Security Intelligence Blog

  • Necurs Evolves to Evade Spam Detection via Internet Shortcut File
  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • The Risks of Bio-IoT

Follow Us

Trend Micro in the News

  • Graffiti in the digital world: How hacktivists use defacement
  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.