• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for May 2016

4 Ways Virtual Threat Protection System Transforms Your Thinking

  • Posted on:May 31, 2016
  • Posted in:Network, Security, Vulnerabilities
  • Posted by:
    TJ Alldridge
0

Like most boys I liked to play with trucks when I was little. I would always go over to by buddy Jeremey’s house to play and one day he pulled out this red, white and blue truck. He was giddy about his truck after a few minutes of pushing it around he said ā€œcheck this…

Read More

Knowing the Blind Spots

  • Posted on:May 31, 2016
  • Posted in:Network, Security
  • Posted by:
    Satinder Khasriya
0

Memorial Day weekend is one of the most traveled weekends in US. As like everyone else I was out with the family for a trip to one of the most beautiful national parks in Texas the Big Bend National park. The most visible sign along the way were the deer signs. They reminded me of…

Read More

This Week in Security News

  • Posted on:May 27, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 23, 2016

  • Posted on:May 27, 2016
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

I think I do a decent job of backing up my data on my various devices. I have everything ranging from old emails to various photos I’ve taken throughout the years. I don’t want to lose my stuff under any circumstances, whether because a system died or I lost an external hard drive. But despite…

Read More

New frontiers for endpoint security software

  • Posted on:May 25, 2016
  • Posted in:Industry News
  • Posted by:Christopher Budd (Global Threat Communications)
0
Cars are one new frontier for antimalware software.

What is the next frontier for endpoint security software?

Read More

Part 5: Time to Shield Your Servers Against a New Breed of Ransomware

  • Posted on:May 24, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Wendy Moore
0

RansomwareĀ is the scourge of the modern IT security team. If allowed to spread through your IT environment it could shut down the organization, denying access to mission critical data for potentially days, or even indefinitely. The result? The disruption of service delivery, lost productivity and a hefty hit to reputation and profits. Some believe the…

Read More

Part 4: Network Defense: Why Visibility is Key to Rooting Out Ransomware

  • Posted on:May 23, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Wendy Moore
0
Hacking communities are actually quite distinct in their cultures.

Most organizations work hard to invest in reducing operating costs and improving the overall efficiency of their networks. But often there are unforeseen risks and costs are associated with the infrastructure connecting servers and hosts internally and out to third parties and devices. Without ā€œagnostic visibilityā€ into all traffic and network activity, hackers will always…

Read More

Part 3: Lock Down the Endpoint as Part of Your Layered Defense Against Ransomware

  • Posted on:May 20, 2016
  • Posted in:Ransomware, Security, Web Threats
  • Posted by:
    Wendy Moore
0
Email may not be as secure as many people might think.

There are few reliable statistics indicating the exact size of the globalĀ ransomwareĀ epidemic. But according to the FBI, just one variant – CryptoWall – netted its authors over $18 million in just over a year. It’s pretty clear that this is the black hats’ new favorite way to extort money from their victims. That’s why we’ve…

Read More

This Week in Security News

  • Posted on:May 20, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 16, 2016

  • Posted on:May 20, 2016
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

I was in a minor car accident last Wednesday. I wasn’t injured and neither was the driver who hit me. Unfortunately, my SUV did suffer some damage and I’m working through the other driver’s insurance for repairs since it was his fault. Even though I hate paying that bill, I’m grateful for insurance and the…

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNĀ® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.