• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Internet of Everything

RSA 2016: Top Four Takeaways

  • Posted on:March 10, 2016
  • Posted in:Internet of Everything, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Attracting the best and brightest in the field, the annual RSA Conference plays an important role in keeping security professionals across the globe connected and educated. Last week, we witnessed several cybersecurity trends and developments including the federal government’s involvement with security, the ease of automotive hacking in modern vehicles, potential threats targeting connected medical…

Read More

Patch Your Servers, Your Phones and your IoT devices?

  • Posted on:January 21, 2016
  • Posted in:Internet of Everything, Security
  • Posted by:Christopher Budd (Global Threat Communications)
1
Targeted attacks are taking place more often, making it increasingly important for businesses to understand how to protect their infrastructures and key assets.

Yes, you read that right: it’s time patch your servers, your phones and your IoT devices for the same vulnerability. The reason for this need to patch broadly is a new vulnerability in the Linux kernel (CVE-2016-0728) that was discovered by the Perception Point Research Team. The kernel is the core of the Linux operating…

Read More

Why Security Must be Center Stage at CES 2016 this Year

  • Posted on:January 5, 2016
  • Posted in:Consumer, Internet of Everything, Security
  • Posted by:
    Cara West-Wainwright
0

It’s that time of the year again – when the great and good of the consumer technology world descend on Las Vegas for a glimpse of the future. Yes, it’s time to shake off that holidays and get down to CES 2016: the world’s largest electronics trade show. With 170,000 attendees and more than 3,500…

Read More

2016: The Year of the Fatal “Smart” Failure?

  • Posted on:November 9, 2015
  • Posted in:Internet of Everything, Security, Vulnerabilities & Exploits
  • Posted by:Christopher Budd (Global Threat Communications)
0

In our 2016 annual predictions, The Fine Line 2016 Predictions, the most frightening and most sensational prediction is that “at least one consumer-grade smart device failure will be lethal in 2016.” It’s easy to misread and misunderstand this to mean that the prediction is that someone will successfully hack a smart device and kill someone….

Read More

Looking Back on ‘Back to the Future’ Day

  • Posted on:October 21, 2015
  • Posted in:Consumer, Internet of Everything, Security, Social
  • Posted by:Christopher Budd (Global Threat Communications)
0

Today is October 21, 2015. This is the date that Marty McFly travelled thirty years into the future to visit in the popular “Back to the Future” series of movies. When fictional dates in the future finally roll around, it’s natural to stop and ask “what did they get right?” and with something as fun…

Read More

Striking the Balance: How Businesses Can Manage BYOD in an IoT World

  • Posted on:August 12, 2015
  • Posted in:Consumer, Data Privacy, Internet of Everything, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

A recent Trend Micro report carried out by the Ponemon Institute uncovered an interesting new dynamic in the workplace. Increasing numbers of U.S. consumers are bringing wearable technology into the office. This raises a difficult problem for enterprise IT managers keen on keeping IoT devices from swamping the workplace as the influx of BYOD devices…

Read More

Is Your Car Connected or Protected?

  • Posted on:August 4, 2015
  • Posted in:Hacks, Internet of Everything, Security, Vulnerabilities & Exploits
  • Posted by:
    Cara West-Wainwright
0

Could you have imagined five years ago that the car you’re driving would have greater computing power than the Apollo 11 that landed on the moon? And could you have imagined that those same cars would be manufactured with state-of-the-art roll bars, airbags and anti-lock brakes to prevent accident and injury, but not sufficient cyber…

Read More

What Smart Device Makers Must Do to Drive the IoT Revolution

  • Posted on:July 16, 2015
  • Posted in:Consumer, Data Privacy, Internet of Everything, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

From fitness trackers to head-mounted displays and even connected home appliances, the Internet of Things (IoT) and smart devices are commanding serious column inches in the media these days. But the reality, according to research commissioned by Trend Micro earlier this year, is that adoption is still on the low side. Can we expect this…

Read More

Compare and Contrast: The Connected World in Europe, Japan and the U.S.

  • Posted on:June 29, 2015
  • Posted in:Consumer, Data Privacy, Internet of Everything, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Today’s continuously connected society is changing many aspects of daily life, yet the majority of respondents in our survey “Privacy and Security in a Connected Life” have not become more concerned overall about the security of their personal data. However, certain aspects of the increased connectivity have made consumers more hesitant across the board. Data…

Read More

Connected Threats: Would You Sell Your Personal Data for Money?

  • Posted on:June 1, 2015
  • Posted in:Consumer, Data Privacy, Internet of Everything, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Unless you’ve been living on Mars for the past few years, you’ll know that the Internet of Things has started to arrive. Billions upon billions of new internet-connected appliances, sensors and other smart gadgets promise to transform our lives, making us more productive, healthy and happy with thousands of them coming online every day. But…

Read More
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.