• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Current News

Social media malware on the rise

  • Posted on:February 24, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

With social media websites like Facebook, Twitter, LinkedIn and others steadily increasing their user numbers, it’s not difficult to image hackers utilizing these platforms to the advantage of their malicious activities.

Read More

How can enterprises reduce the risk of human error in cyber security?

  • Posted on:February 23, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

While many cyber security risks come from the outside, a similar number and variety can originate within a given organization

Read More

Cyber security and the Super Bowl: What can enterprises learn?

  • Posted on:February 11, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

The Super Bowl is often a good indicator of trends in consumer technology and cyber security.

Read More

Identifying and containing new cyber security risks in the Internet of Things

  • Posted on:February 10, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

The scope of the Internet of Things makes it a central cyber security concern.

Read More

History of Flash: Zero day and other vulnerabilities

  • Posted on:February 6, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

In recent years, the Adobe Flash Player has been a magnet for cyber criminals.

Read More

The two sides of encryption: Protection for and against cybercrime

  • Posted on:February 5, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Although U.K Prime Minister David Cameron noted that encryption could be providing a safe haven for cybercriminal activities, the technology is also vital in protecting information belonging to businesses, federal organizations and individual users.

Read More

Top 4 hacker strategies targeting the enterprise sector

  • Posted on:February 4, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

It is best to examine the top approaches cybercriminals are using to breach businesses so that corporate protection administrators can head off attackers before they are ever able to threaten the organization.

Read More

Breaches call attention to risk of spear phishing

  • Posted on:January 29, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

An increase in spear phishing attacks on high-profile businesses demonstrate the need for better preventative security. 

Read More

Network detection evasion: Current threats and protection strategies

  • Posted on:January 28, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

Hackers are increasingly using network detection evasion strategies, which typically involves masking malicious network traffic so that it blends in with legitimate traffic. 

Read More

Security teams struggle to make sense of numerous malware notifications

  • Posted on:January 27, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

How can security teams make sense of thousands of malware alerts?

Read More
Page 29 of 30 « ‹ 282930 ›

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Skimming and Phishing Scams Ahead of Black Friday and Polish Hacking Team Wins Capture the Flag Competition
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.