• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Mobility

Russian cybercriminals turn Android malware into an industry

  • Posted on:August 15, 2013
  • Posted in:Cybercrime, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

A select group of ten Russian gangs is molding Android SMS chargeware, the most common type of mobile phone malware, into a full-fledged business supported by a dedicated marketing team and an array of websites.

Read More
Tags: cybercrimeInternet ProtectionMobilityUnderground EconomyVulnerabilitiesweb threats

Android lends a hand to mobile device managers

  • Posted on:July 5, 2013
  • Posted in:Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

Android hasn’t been getting the most positive press as of late, but the company may soon be winning the favor of mangers looking for mobile device management and positive BYOD (Bring your own Device) features.

Read More
Tags: cybercrimeData PrivacyMobility

Medical offices using mobile need security policies

  • Posted on:June 28, 2013
  • Posted in:Cloud Computing, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

Healthcare, as with any other industry, is starting to see an influx of mobile devices in the workplace. TechTarget’s James Brady wrote that these devices have emerged as one of the top drivers for improving the quality, cost-effectiveness, accessibility and even safety of care.

Read More
Tags: Cloud SecurityData PrivacyMobilityweb threats

Attention to application security in BYOD boosts productivity, safety

  • Posted on:June 28, 2013
  • Posted in:Compliance & Regulations, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

The adoption of mobile devices and a BYOD (Bring your own Device) policy likely means that organizations will see a rise in their level of productivity. A report from the Australian Mobile Telecommunications Association found that the productivity benefit of BYOD will actually reach $11.8 million Australian dollars, or just under $11 million U.S. dollars, by 2025.

Read More
Tags: Compliance & RegulationscybercrimeData PrivacyMobilityweb threats

Workforce mobilization becoming the new normal in healthcare

  • Posted on:June 17, 2013
  • Posted in:Compliance & Regulations, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

Although security is always a concern with healthcare organizations, many are taking the route of using mobile devices as part of a BYOD (Bring your own Device) plan and worrying about securing data and devices to take advantage of the benefits these systems offer.

Read More
Tags: Compliance & RegulationsMobilityPrivacy & Policy

HR could play leading part in BYOD success

  • Posted on:June 12, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

It’s a trying time to be an IT director tasked with navigating a company’s move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE Conference and Expo had many professionals saying that BYOD could be considered more of a “people problem” than a strictly technical concern.

Read More
Tags: Cloud SecurityCompliance & RegulationsData PrivacyMobilityweb threats

Malware infecting 58 million US PCs

  • Posted on:May 6, 2013
  • Posted in:Current News, Cybercrime, Mobility
  • Posted by:
    Trend Micro
0

With threats online looming larger than ever before, data security is now imperative for all users, whether at home or working in an office setting. Coming to a bill of about $4 billion, Consumer Reports’ Annual State of the Net Report found that about 58.2 million PCs in the U.S. are or have been infected by malware in the past year.

Read More
Tags: Current NewscybercrimeMobility

Apply lessons learned from Wi-Fi to help BYOD

  • Posted on:April 26, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Mobility
  • Posted by:
    Trend Micro
0

It wasn’t long ago that companies had to figure out the Wi-Fi system for their company and how they wanted to make sure everything was secure across the network. Now, businesses are dealing with mobile devices as a transformative technology and must work to figure out a BYOD (Bring your own Device) plan before it is too late

Read More
Tags: Cloud SecurityCompliance & RegulationsMobility

US Army having some troubles with BYOD

  • Posted on:April 5, 2013
  • Posted in:Compliance & Regulations, Current News, Mobility
  • Posted by:
    Trend Micro
0

Many companies have been attempting to adopt a BYOD (Bring your own Device) policy, but not many are quite so secretive about their information as the U.S. Army is, thereby making security paramount in the quest for allowing workers to bring their own devices.

Read More
Tags: Compliance & RegulationsCurrent NewsMobility

Ensuring comprehensive endpoint security

  • Posted on:March 7, 2013
  • Posted in:Cybercrime, Mobility
  • Posted by:
    Trend Micro
0

Every company now has a new security worry, and that is the effect of endpoint security stemming from a BYOD (Bring your own Device) program. John Sawyer wrote on Dark Reading that a flaw in any kind of end users device can lead to a breach that could reverberate across the entire company.

Read More
Tags: cybercrimeMobility
Page 1 of 612 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.