• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Author / Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)

Rik Ferguson

VP, Security Research

Rik is actively engaged in research into online threats and the underground economy. He also researches the wider implications of new developments in the Information Technology arena and their impact on security both for consumers and in the enterprise, contributing to product development and marketing plans. Recognized as an industry thought leader and analyst, Rik is regularly quoted by the press on issues surrounding information security, cybercrime and technology futures by trade, national and international media. Follow Rik on Twitter.

Social Media Privacy Settings Are Important

  • Posted on:April 6, 2015
  • Posted in:Consumer, Security, Social, Social Media
  • Posted by:Rik Ferguson (VP, Security Research)
0

We all enjoy keeping up with friends and family on social media, but we have to be mindful of our privacy and security when we do. Here are some suggestions to help keep your personal information private: 1. Understand what information the site needs for your account and how they use it in the first…

Read More

How to Protect Your Computer from Malware

  • Posted on:March 30, 2015
  • Posted in:Malware, Security, Social
  • Posted by:Rik Ferguson (VP, Security Research)
1

Protecting your computer and personal devices from malware requires both ongoing personal vigilance and help from professional security companies. Nowadays, malware doesn’t just target your home computers but also the mobile devices that you and your family are using. And the problem is bigger than you might think. Last year, an average 80 million malware…

Read More

Targeted Attack: The Game

  • Posted on:March 25, 2015
  • Posted in:Data Privacy, Security, Web Security, Web Threats
  • Posted by:Rik Ferguson (VP, Security Research)
0

April 2015 sees the release of a project that has been a year in the making for us. Something that we had affectionately been calling “Choose Your Own Adventure” for most of its lifetime as we laid it out, put some meat on the bones and finally stitched it all together (no we weren’t making…

Read More

Ensuring Internet Safety for Kids Requires Careful Mix

  • Posted on:March 23, 2015
  • Posted in:Security, Social, Web Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

Ensuring Internet safety for kids is more complex than ever before because it now includes all your family’s home computers, cell phones, and tablets. Every device should be a part of the safety program. Creating a safer Internet environment for kids requires a careful mix of parental authority and family trust. Parental authority extends to…

Read More

Point-of-Sale. Point-of-Compromise

  • Posted on:March 3, 2015
  • Posted in:Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

2014 saw a significant jump in the quantity, quality and prevalence of point-of-sale malware attacks. These malicious creations, commonly referred to as PoS RAM Scrapers are designed to compromise the terminals used by businesses the world over to carry out retail transactions. Tens of millions of payment card details are routinely stolen, sometimes in a…

Read More

How Secure is your Password?

  • Posted on:March 2, 2015
  • Posted in:Security, Social
  • Posted by:Rik Ferguson (VP, Security Research)
2

Every day it seems we need to create a new account online and with each new account comes the added risk of our personal information being stolen. Managing passwords to online accounts is not a simple matter. We could all use a little help. Using a password manager like Trend Micro™ Password Manager to help…

Read More

My iPhone is like a Shield of Steel

  • Posted on:January 8, 2015
  • Posted in:Security
  • Posted by:Rik Ferguson (VP, Security Research)
16

Much of the concern around mobile operating systems and services has focused on the risks inherent in the Android platform. The openness and widespread nature of the ecosystem has certainly led to it being both the most widespread, the most widely targeted, and the most successfully exploited. Google’s Android has traditionally had a less rigorous…

Read More

The Ultimate Goal of Digital Attacks

  • Posted on:December 17, 2014
  • Posted in:Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

For the final blog post in the series supporting the release of our Q3 Threat Roundup “Vulnerabilities Under Attack” I was asked to write “an analysis of security challenges faced by users.” Fortunately I have the source material of the Threat Roundup to stick to because really, that’s a subject deserving of a series in…

Read More

Who knows what Santa knows?

  • Posted on:December 3, 2014
  • Posted in:Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

Of course we all know that Father Christmas is out there, with his happy elves, keeping tabs on us throughout the year. In fact every year a considerable part of my time each day is spent going through my activities and making sure that nothing I have done will mean that I end up on…

Read More

The Unavoidable Acceleration of Everything. What next for wearables and IoE?

  • Posted on:November 13, 2014
  • Posted in:Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

It is perhaps telling that when preparing this blog post, I had to add the word “wearables” to the dictionary of my word processor. We are still at the very beginning of the journey into an interconnected “Internet of Everything” but the truth is that every beginning exists in its own unique circumstances. The circumstances…

Read More
Page 2 of 5 ‹ 123 › »

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Skimming and Phishing Scams Ahead of Black Friday and Polish Hacking Team Wins Capture the Flag Competition
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.