• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for August 2016

This Week in Security News

  • Posted on:August 19, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Why Domain Generating Algorithms (DGAs)?

  • Posted on:August 18, 2016
  • Posted in:Network, Security
  • Posted by:
    Josiah Hagen and Shoufu Luo
0
What happens when the government is the victim of a cyber attack?

Command-and-control (C&C) infrastructure plays an essential role of coordinating botnets and malware. Attackers set up C&C servers to distribute commands or harvest sensitive data from victims’ computers. Simple C&C setups based on hardcoded IPs provide an opportunity for defense. Defenders can blacklist the C&C server IP address or domains. Law enforcement agencies may take down…

Read More

What’s the deal with two-factor authentication?

  • Posted on:August 17, 2016
  • Posted in:Industry News, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0
Two-factor authentication has come under fire from the NIST recently.

Two-factor authentication is widely recognized as a more secure practice than only requiring a password.

Read More

Coffee and CyberAid: How Trend Micro is Securing US Healthcare

  • Posted on:August 17, 2016
  • Posted in:Executive Insight, Healthcare, Security
  • Posted by:
    Wael Mohamed
0

A few months back I sat down over coffee with Dan Nutkis, the CEO of health information trust alliance HITRUST. The topic for discussion? How to tackle the massive and growing cyber threat facing our most vulnerable healthcare organizations, from the ground up. There and then I pledged Trend Micro’s 100% support, and that discussion…

Read More

Sales Means Success: How Trend Micro Built an Award-Winning Team

  • Posted on:August 17, 2016
  • Posted in:Executive Insight, Industry News, Security, Trend Spotlight
  • Posted by:
    Sanjay Mehta
0

At Trend Micro we’ve been protecting consumers, businesses and government agencies around the world from the latest cyber threats for more than 26 years. What’s the secret to our success? Fantastic solutions and a global team of the very best threat researchers you can find anywhere on the planet, of course. We are fortunate to have…

Read More

Hacking the grid: How cyber criminals can gain access to critical infrastructure

  • Posted on:August 15, 2016
  • Posted in:Industry News, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0
A country's critical infrastructure is critical to daily operations.

A country’s critical infrastructure is a major attack vector for hackers. 

Read More

POS malware strikes again

  • Posted on:August 15, 2016
  • Posted in:Industry News, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0
POS malware is still a huge problem.

POS malware is in the headlines again.

Read More

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 8, 2016

  • Posted on:August 12, 2016
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

A quinceañera is a Latin American “coming of age” celebration of a girl’s fifteenth birthday – similar to that of a Sweet Sixteen celebration in North America or a Bat Mitzvah in the Jewish community. Some quinceañeras can be as expensive as a small wedding or a down payment on an expensive car, so I…

Read More

This Week in Security News

  • Posted on:August 12, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

It takes a planet: Why international cyber security cooperation is more important than ever

  • Posted on:August 11, 2016
  • Posted in:Industry News, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0
The battle against cyber crime takes a unified, global front.

Cyber crime is a global epidemic, and as such, an international approach to beating it is necessary.

Read More
Page 2 of 4 ‹ 123 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, äž­ć›œ, æ—„æœŹ, ëŒ€í•œëŻŒê”­, 揰灣
  • Latin America Region (LAR): Brasil, MĂ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Đ ĐŸŃŃĐžŃ, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.