• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Encryption

NFC hack exposes weakness in transit security

  • Posted on:October 1, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Two security researchers have developed an app that could help them score free train rides by exploiting NFC-enabled fare systems.

Read More
Tags: Encryption

Thales study finds Australian organizations ahead on encryption

  • Posted on:September 5, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Encryption has proven to be one traditional tactic still capable of keeping data safe in the modern cybersecurity climate.

Read More
Tags: Encryption

Business continuity falling flat over data security

  • Posted on:August 28, 2012
  • Posted in:Compliance & Regulations, Encryption
  • Posted by:
    Trend Micro
0

A pair of recent studies shows that more small business owners claim they are ready disaster, yet some are not taking adequate steps to protect their data.

Read More
Tags: Compliance & RegulationsEncryption

Key management essential to successful cloud encryption strategies

  • Posted on:August 16, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Security concerns have been present since the dawn of cloud computing.

Read More
Tags: Encryption

Facial recognition gives security IT a blow to the face

  • Posted on:July 5, 2012
  • Posted in:Encryption, Privacy & Policy
  • Posted by:
    Trend Micro
0

The merger of Face.com and Facebook was originally lauded by the software company on its blog but data security questions immediately began to arise due to privacy concerns but the fact that KLIK, Face.com’s mobile app, may have come with a dirty little secret.

Read More
Tags: EncryptionPrivacy

Researchers highlight risks of fragmented encryption strategies

  • Posted on:June 28, 2012
  • Posted in:Encryption
  • Posted by:
    Noah Gamer
0

Although most enterprise IT professionals are well aware of the potential advantages of data encryption, there are notable loopholes in how the technology is being applied.

Read More
Tags: Encryption

Quantum encryption advancements may make hackers irrelevant

  • Posted on:June 28, 2012
  • Posted in:Encryption
  • Posted by:
    Noah Gamer
0

Keeping sensitive information out of the hands of malicious individuals is one of the most important aspects of business today.

Read More
Tags: Encryption

Outdated data solutions lead to data breach

  • Posted on:May 31, 2012
  • Posted in:Encryption, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

A recent data breach in California is highlighting the ongoing problem of outdated data storage and transfer methods in the fight to maintain data security.

Read More
Tags: EncryptionVulnerabilities

Strong encryption keys essential to data protection

  • Posted on:April 16, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Data security has become a top priority for most IT departments, as numerous organizations are falling victim to damaging data breaches.

Read More
Tags: Encryption

Prioritizing data over device in mobile security

  • Posted on:April 16, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

as technology teams struggle to support a variety of mobile operating systems running on a ever-expanding range of devices, the key to risk management may be focusing on company data, as opposed to the endpoint it is accessed from or carried on.

Read More
Tags: Encryption
Page 3 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.