Instant Messaging worms are nothing new. These first showed up on the scene back in the mid 2000’s as instant messaging applications started making inroads in the enterprise. Back in those days, people were starting to run AOL Instant Messenger, Windows Live Messenger, or Yahoo! Messenger on their work machines while logged into their personal…Read More
Each quarter, we go back to our annual predictions and take a look to see if our projections have been on the mark…. or not. For this quarter, we’ve focused on our 2012 prediction that there would be 125,000 pieces of malware affecting the Android mobile platform by the end of the year. At the…Read More
By Tony Larks, Vice President, Global Consumer Marketing, Trend Micro This week three of the most notorious malware families have been spotted to work together on a global scale to create one single attack. The three variants identified by TrendLabs, the heart of Trend Micro’s threat research, are dressed in popular files, hidden in email…Read More
Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important. But with today’s cloud computing, mobile devices, and advanced persistent threats (APTs), businesses need security that protects their data wherever it travels and in whatever type of device it resides, requiring new data-centric security. …Read More
For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to help shape the questions on the survey, I’ve also been on the team interpreting the results. We’ve learned more than a…Read More
With the launch announcements of various Google Chrome OS netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of the more ’media friendly‘ statements such as, “…users don’t have to deal with viruses, malware and security updates”.
Part 1 of 2 parts IPv6 will change how we use the internet, again. To the typical user, there is no difference; web sites work the same. But email is a different story. When using IPv6, addresses are allocated in a different manner. Most end-users today get one IP address, which is shared between multiple…Read More
Is Virtualization stupid? It forces guest VMs sharing a host to do the same things over and over, without sharing. It takes up countless hours of otherwise useful – and expensive – server time.
Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.