• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security

Are You Stuck in a Botnet?

  • Posted on:October 21, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
2

Would you know if your computer was a part of a botnet? Perhaps a better question to ask is: Do you know what a botnet is and why it’s dangerous? A botnet is a network of computers that have been set up or hijacked, without the owner’s knowledge, to do harm. These computers are used…

Read More

What Does the Fearless Web Really Mean?

  • Posted on:October 15, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

The Internet is certainly one of the greatest innovations in recent history. With a few keystrokes you can access information from around the world in an instant. You can find amazing deals online by browsing a few websites. You can research virtually any topic under the sun, all while never leaving your home. You can…

Read More

What does it mean for Trend Micro™ Titanium™ security to be “light?”

  • Posted on:October 5, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Most computer users recognize the need for antivirus and Internet security software. However, many users don’t necessarily know the advantages of some of the technology available. Trend Micro Titanium offers Internet security and antivirus software that is unique because it utilizes cloud-client technology to protect your computer. How does this benefit the user? There are…

Read More

What is a Hacker?

  • Posted on:September 30, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

The origin of the term “hacker” goes back several decades. Originally, it referred to anyone who enjoyed tinkering with electronic devices to see how they worked and how they could be improved. Today, the term hacker is most commonly associated with someone who accesses a computer or data on a computer without permission. A hacker…

Read More

Help! My Parents are Internet Newbies!

  • Posted on:September 24, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

So, your parents have finally joined the rest of the world and gotten a computer. Here’s how you can help make their online experience enjoyable and safe: • Suggest they take an introductory computer/Internet class. (Some local community centers may offer this for free—also try the library, community college, or even a senior center.) Review…

Read More

Top Five Myths About Online Security

  • Posted on:September 16, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Check your online security savvy. How many of these common myths did you believe? Myth 1. Installing and using antivirus software is enough to protect my system from viruses Having antivirus software is critical to protect your system from viruses, but you need to make sure your security is up to date, and that’s a…

Read More

Top Five Internet Hoaxes

  • Posted on:September 15, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Internet hoaxes have been around almost as long as the Internet because the technology provides a perfect vehicle for spreading an urban legend. All you have to do is post a “tall tale” on a website or send it in an email and it seems that in no time everyone is chattering about it. See…

Read More

Harmful Internet Scams

  • Posted on:September 14, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
1

There are hundreds of scams on the Internet today. While some are entirely plausible, others are so farfetched they make you laugh. Yet, for the, ahem—gullible, these can be costly and dangerous. Here are five classic viral scams that have tricked many people over the years: SCAM #1: A wealthy Nigerian needs your help to…

Read More

Who Creates Viruses… and WHY?

  • Posted on:September 13, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
2

Five little words you do not want to hear: “Your computer has a virus.” Even if you know almost nothing about computers, you know this is bad. So why would anyone create a virus anyway!? Malware, short for malicious software, includes many types of software written with the intent of harming your computer, invading your…

Read More

Top Five Ways to Get Fired Over Social Media

  • Posted on:September 10, 2010
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Social media (Facebook, MySpace, Twitter, blogging, etc) can be a great way to communicate and catch up with friends, old and new, but it can certainly have a downside as well. The problems most often occur when the line between personal and professional life is crossed. So what should you avoid, at all costs, while…

Read More
Page 149 of 149 « ‹ 148149

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.