• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research

Managing Your Google+ Privacy Settings

  • Posted on:August 3, 2011
  • Posted in:Security
  • Posted by:
    Richard Medugno
3

By Vic Hargrave Since launching on June 28, Google+ has already made a big splash on the social networking scene by attracting more than 25 million users as of this writing, according to Internet measurement service comScore. Although Google+ has a ways to go before it catches up to Facebook’s 750 million users, when support…

Read More

Newly Released Gartner 2011 Hype Cycle for Cloud Computing – Does Cloud Security Belong?

  • Posted on:August 1, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Gartner recently released their Hype Cycle for Cloud Computing, 2011, which you can see legally reproduced here on the excellent Software Strategies Blog. While there is a lot of really good analysis in this hype cycle, I just don’t buy the cloud security positioning. Cloud security is positioned so it is about to fall into…

Read More

There is a bug in my Apple – Part 2

  • Posted on:July 29, 2011
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

Intego announces first-ever iPhone malware scanner – really? July 12, 2011 11:49 AM ET Gregg Keizer – COMPUTERWORLD http://www.computerworld.com/s/article/9218339/Mac_security_firm_ships_first_ever_iPhone_malware_scanner Follow up on my previous post on the new security flaw discovered in Apple’s iPhone and iPad – see http://bringyourownit.com/2011/07/07/oops-there-is-a-bug-in-my-apple/ With impeccable timing, this morning Intego announded the availability of the “first-ever iPhone malware scanner”. Sure…

Read More
Tags: AppleAT&TgsmhsdpaiPadiPhonemicro simMobile BroadbandmonopolysecuritysimT-Mobilethreatvulnerability

Can You Pass a Social Media Background Check?

  • Posted on:July 28, 2011
  • Posted in:Social
  • Posted by:
    Richard Medugno
2

By Richard Medugno Recently, on the Fearless Web Facebook page, we posted an article from the New York Times titled “Social Media History Becomes a New Job Hurdle” and asked our fans if they thought it was “OK” for companies to screen out prospective employees based on their social media history. Of the six responses,…

Read More

Out With the Old, In With the New, In With the Old?

  • Posted on:July 28, 2011
  • Posted in:Mobility
  • Posted by:
    Trend Micro
3

The mobile industry is a beautiful thing.  If I sit back and ponder for a minute all of the things mobile technology has enriched in my life, I could easily write a book.  The fact that I can take a picture and have it immediately shared to all of my friends and family in seconds…

Read More
Tags: consumerizationMDMMDPMicrosoftNokiaWindows Phone 7WP7

Fighting Application Level DDoS Attacks Using Ambient Clouds – New Idea

  • Posted on:July 28, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
3

The application-layer DDoS threat actually amplifies the risk to data center operators. That’s because IPS devices and firewalls become more vulnerable to the increased state demands of this emerging attack vector – making the devices themselves more susceptible to the attacks. Moreover, there is a distinct gap in the ability of existing edge-based solutions to…

Read More
Tags: cloud computingCloud Securitycloud-based securitySecureCloud

Why Apple Should Release iFurnace Powered by iCloud: Another Case for Ambient Clouds

  • Posted on:July 27, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Check out the linked article from popsci.com. It reviews how researchers at Microsoft propose using servers installed in office buildings and apartments as “data furnaces” to keep people warm, effectively using what is today waste heat. This kind of thinking can help to prevent implementing “Super Cool Biz” programs in your city, as documented by…

Read More

Zeus, Riverbed, F5, and Citrix: Why software beats hardware in the cloud

  • Posted on:July 21, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Riverbed just announced the acquisition of virtual appliance and cloud load balancing company Zeus Technologies. Zeus is an almost 15 year old startup that competes directly with F5 and Citrix Netscaler. I have a unique perspective on this, as I was Director of Product Management at NetScaler, responsible for the advanced acceleration features of the…

Read More

Apple’s iCloud – an Ambient Cloud from the Future

  • Posted on:July 17, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
1

Cloud computing has a capacity problem. A big one. No matter how many data centers we build, we’ll always be behind the curve of demand for capacity. I’ve been predicting since 2008 that ambient clouds will become the dominant way of delivering cost-effective, performant cloud capacity. It’s the only way I can imagine serving every…

Read More

Oops … there is a bug in my Apple

  • Posted on:July 13, 2011
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

The new security hole found in iPhones and iPads reminds us that no platform is immune to security threats and that there is in fact a need for mobile security software for Apple products. http://online.wsj.com/article/SB10001424052702303365804576431541102701136.html Here we go. As it turns out Apple mobile operating system is not so secure after all. While it is…

Read More
Tags: AppleAT&TgsmhsdpaiPadiPhonemicro simMobile BroadbandmonopolysecuritysimT-Mobilethreatvulnerability
Page 228 of 240 « ‹ 227228229 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.