• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Social

Looking Back on ‘Back to the Future’ Day

  • Posted on:October 21, 2015
  • Posted in:Consumer, Internet of Everything, Security, Social
  • Posted by:Christopher Budd (Global Threat Communications)
0

Today is October 21, 2015. This is the date that Marty McFly travelled thirty years into the future to visit in the popular “Back to the Future” series of movies. When fictional dates in the future finally roll around, it’s natural to stop and ask “what did they get right?” and with something as fun…

Read More

Social Media Privacy Settings Are Important

  • Posted on:April 6, 2015
  • Posted in:Consumer, Security, Social, Social Media
  • Posted by:Rik Ferguson (VP, Security Research)
0

We all enjoy keeping up with friends and family on social media, but we have to be mindful of our privacy and security when we do. Here are some suggestions to help keep your personal information private: 1. Understand what information the site needs for your account and how they use it in the first…

Read More

How to Protect Your Computer from Malware

  • Posted on:March 30, 2015
  • Posted in:Malware, Security, Social
  • Posted by:Rik Ferguson (VP, Security Research)
1

Protecting your computer and personal devices from malware requires both ongoing personal vigilance and help from professional security companies. Nowadays, malware doesn’t just target your home computers but also the mobile devices that you and your family are using. And the problem is bigger than you might think. Last year, an average 80 million malware…

Read More

Ensuring Internet Safety for Kids Requires Careful Mix

  • Posted on:March 23, 2015
  • Posted in:Security, Social, Web Security
  • Posted by:Rik Ferguson (VP, Security Research)
0

Ensuring Internet safety for kids is more complex than ever before because it now includes all your family’s home computers, cell phones, and tablets. Every device should be a part of the safety program. Creating a safer Internet environment for kids requires a careful mix of parental authority and family trust. Parental authority extends to…

Read More

How Secure is your Password?

  • Posted on:March 2, 2015
  • Posted in:Security, Social
  • Posted by:Rik Ferguson (VP, Security Research)
2

Every day it seems we need to create a new account online and with each new account comes the added risk of our personal information being stolen. Managing passwords to online accounts is not a simple matter. We could all use a little help. Using a password manager like Trend Micro™ Password Manager to help…

Read More

For a Greater Goal

  • Posted on:February 17, 2015
  • Posted in:Security, Social, Trend Spotlight
  • Posted by:
    Trend Micro
0

In the coming months, we’ll be sharing some exciting details and announcements around this year’s FIFA Women’s World Cup Canada 2015™.  As a National Supporter of the tournament, Trend Micro will be further aligning its corporate culture with an outstanding organization. The celebration of these world class female athletes will begin June 6 and run…

Read More

Does Mom Need Parental Controls?

  • Posted on:May 8, 2014
  • Posted in:Security, Social
  • Posted by:
    Shannon McCarty-Caplan
0

“Can you hear that?” my mother shouts arm’s length distance from the phone. “What am I listening for?” I reply. “A buzzing and whooshing sound, coming from my computer,” she yells again. This is just an example of the tech support request calls I get on the regular from my cute little mama.  She only…

Read More

Playing the Fool: How I got Phished and Spoofed

  • Posted on:April 1, 2014
  • Posted in:Security, Social
  • Posted by:
    Shannon McCarty-Caplan
3

Happy April Fools to me! Recently, I received a direct Twitter message from my one of my closest friends late one night. It said, “did you see this picture of you lol” and included a shortened web link. Considering that my friend is a photographer who I know has photos of me, it wasn’t strange to receive this…

Read More

How to Keep Your Boss in the Dark about Your St. Patty’s Day Celebrating

  • Posted on:March 14, 2014
  • Posted in:Security, Social
  • Posted by:
    Shannon McCarty-Caplan
0

Chicago is alive with preparations for its big St. Patrick’s Day Celebrations this weekend. The Saturday before St. Patrick’s Day, the Chicago River downtown is dyed green (now with non-toxic dye), followed by the parade, with revelry planned on both days throughout the city everywhere from pubs and restaurants to cultural centers and churches. I…

Read More

2020: the end of a series, the future of cyber security

  • Posted on:November 26, 2013
  • Posted in:Social, Trend Spotlight
  • Posted by:Rik Ferguson (VP, Security Research)
0

After eight weeks of thrills and spills, Trend Micro’s ground-breaking web video project 2020: the Series finally draws to a close on Tuesday in spectacular style. It’s been our aim as a global leader in information security for the past quarter of a century to get more of you out there thinking about what our…

Read More
Page 1 of 712 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.