• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Encryption

NFC hack exposes weakness in transit security

  • Posted on:October 1, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Two security researchers have developed an app that could help them score free train rides by exploiting NFC-enabled fare systems.

Read More
Tags: Encryption

Thales study finds Australian organizations ahead on encryption

  • Posted on:September 5, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Encryption has proven to be one traditional tactic still capable of keeping data safe in the modern cybersecurity climate.

Read More
Tags: Encryption

Business continuity falling flat over data security

  • Posted on:August 28, 2012
  • Posted in:Compliance & Regulations, Encryption
  • Posted by:
    Trend Micro
0

A pair of recent studies shows that more small business owners claim they are ready disaster, yet some are not taking adequate steps to protect their data.

Read More
Tags: Compliance & RegulationsEncryption

Key management essential to successful cloud encryption strategies

  • Posted on:August 16, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Security concerns have been present since the dawn of cloud computing.

Read More
Tags: Encryption

Facial recognition gives security IT a blow to the face

  • Posted on:July 5, 2012
  • Posted in:Encryption, Privacy & Policy
  • Posted by:
    Trend Micro
0

The merger of Face.com and Facebook was originally lauded by the software company on its blog but data security questions immediately began to arise due to privacy concerns but the fact that KLIK, Face.com’s mobile app, may have come with a dirty little secret.

Read More
Tags: EncryptionPrivacy

Researchers highlight risks of fragmented encryption strategies

  • Posted on:June 28, 2012
  • Posted in:Encryption
  • Posted by:
    Noah Gamer
0

Although most enterprise IT professionals are well aware of the potential advantages of data encryption, there are notable loopholes in how the technology is being applied.

Read More
Tags: Encryption

Quantum encryption advancements may make hackers irrelevant

  • Posted on:June 28, 2012
  • Posted in:Encryption
  • Posted by:
    Noah Gamer
0

Keeping sensitive information out of the hands of malicious individuals is one of the most important aspects of business today.

Read More
Tags: Encryption

Outdated data solutions lead to data breach

  • Posted on:May 31, 2012
  • Posted in:Encryption, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

A recent data breach in California is highlighting the ongoing problem of outdated data storage and transfer methods in the fight to maintain data security.

Read More
Tags: EncryptionVulnerabilities

Strong encryption keys essential to data protection

  • Posted on:April 16, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Data security has become a top priority for most IT departments, as numerous organizations are falling victim to damaging data breaches.

Read More
Tags: Encryption

Prioritizing data over device in mobile security

  • Posted on:April 16, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

as technology teams struggle to support a variety of mobile operating systems running on a ever-expanding range of devices, the key to risk management may be focusing on company data, as opposed to the endpoint it is accessed from or carried on.

Read More
Tags: Encryption
Page 3 of 3123

Security Intelligence Blog

  • (Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing
  • Waterbear is Back, Uses API Hooking to Evade Security Product Detection
  • December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.