• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for February 2018

VPN 101 – Part 2: How to Set Up the VPN/Content Shield in Trend Micro Mobile Security for iOS

  • Posted on:February 28, 2018
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Trend Micro
0
Mobile games are susceptible to malware.

Submitted by Brook Stein When you use Content Shield in Trend Micro Mobile Security for iOS, you’re protected from web threats across all iOS browsers and in apps that load websites. If you activate Age filters for your family members, they’re also protected from going to inappropriate websites. Content Shield is pre-enabled by first activating…

Read More
Tags: Content ShieldVPN

A Tea Party with a Difference: Trend Micro Supports Arts and Cultural Education in Rural Taiwan

  • Posted on:February 27, 2018
  • Posted in:Security, Trend Spotlight
  • Posted by:
    Jenny Chang, Chief Cultural Officer (CCO)
0

Trend Micro has been at the cutting edge of technology innovation for almost 30 years. During that time, we’ve always had to have a keen eye on what’s coming next — anticipating threats so we can keep our customers protected, whatever comes their way. But we also recognize that in our race for the modern,…

Read More
Tags: Trend Micro Education Foundation

VPN 101 – Part 1: What You Need to Know to Stay Safe and Protect Your Privacy Online

  • Posted on:February 26, 2018
  • Posted in:Business, Consumer, Security
  • Posted by:
    Trend Micro
0
WikiLeaks has published more than 80 strains of malware.

Submitted by Brook Stein The Internet is a wonderful thing. But we all know there are also risks lurking around every corner. We want to protect ourselves from malware and identity theft, prevent third-party trackers and advertisers slurping our private information, and keep our kids safe when browsing. One way to do this is to…

Read More
Tags: parental controlsVPNweb threat protection

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 19, 2018

  • Posted on:February 23, 2018
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

Earlier this week, Trend Micro released its Security Roundup for 2017, which reveals an increase in ransomware, cryptocurrency mining and business email compromise (BEC) attempts over the past year as cybercriminals refined and targeted their attacks for greater financial return. Surprisingly, some of the biggest attacks still rely on known vulnerabilities that have available patches….

Read More
Tags: Business Email CompromisecryptocurrencyGDPRransomware

This Week in Security News: Bank Robberies and Whaling

  • Posted on:February 23, 2018
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0
week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, business leaders share their tips on keeping their companies safe, hackers stole from a Russian central bank, and Google reveals a new Microsoft Edge flaw. Read on…

Read More
Tags: CISOGoogleGoogle’s Project ZeroInternet of Things (IoT)SWIFT messaging system

Securing IoT Networks

  • Posted on:February 22, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0
The typical enterprise has more than 500 applications in place.

Q: How do you segment a mesh? A: You can’t. Legacy IoT devices, Industrial Control Systems with custom networking, are exceptionally difficult to secure. Typically, these devices contain only enough compute capabilities to support their primary operational function. They have limited memory, low power, constrained CPU resources, and very little network bandwidth. They do not…

Read More
Tags: industrial control systemsSecuring IoT Networks

Securing Our Connected Car Future with Panasonic

  • Posted on:February 21, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    Trend Micro
0

There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications…

Read More
Tags: GartnerInternet of Things (IoT)PanasonicPanasonic’s Control Area Network (CAN)

Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test

  • Posted on:February 20, 2018
  • Posted in:Business, Network, Security
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

One of the key use cases for our customers is the protection of their data center environments, which can involve moving off the perimeter into the data center or segmenting their data center from the rest of the organization. It is imperative that a data center security solution not only deliver high inspection throughput and…

Read More
Tags: Data Center Network Security Test MethodologyDCIPSNSS LabsTrend Micro Achieves “Recommended” Rating

Securing Our Connected Car Future with Panasonic

  • Posted on:February 20, 2018
  • Posted in:Business, Internet of Things, Security
  • Posted by:
    Trend Micro
0

There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications…

Read More
Tags: electronic control units (ECUs)infotainmentIoTPanasonic

This Week in Security News: Senate Hearings and Equifax Breaches

  • Posted on:February 16, 2018
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0
week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, leaders of six security agencies testified before the Senate Intelligence Committee, the Equifax hack grew in severity, and hackers used the power of Machine Learning to spread…

Read More
Tags: breachescryptocurrencycyberattacks
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNÂŽ Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.