• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Research

Hackers could pervert power of the cloud for new attacks

  • Posted on:December 11, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

The seemingly limitless computational power of cloud computing is among the technology’s most attractive value propositions, but placed in the wrong hands, it could fuel untold danger.

Read More
Tags: Research

DDoS, SQL injection top cybercriminal priority lists

  • Posted on:December 3, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

DDoS attacks and SQL injections continue to be the most popular topics of discussions among hackers, respectively attracting approximately 20 percent of all cybercriminal forum threads.

Read More
Tags: Research

Securing Your Virtual Infrastructure [Infographic]

  • Posted on:November 12, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
1

Virtualization and transitioning to the cloud create new challenges for organizations in order to secure the data centers unique to these environments. A recent survey, conducted by IDG Research Services, showed that IT professionals are concerned about deploying traditional security products in virtualized data centers for a variety of reasons: Want detail on the full…

Read More
Tags: cloudCloud SecuritydatacenterIDGResearchvirtualizationwhite paper

Research outlines mobile app privacy disconnect

  • Posted on:November 5, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

Opaque and incomplete privacy policies are preventing mobile app users from making informed data security decisions.

Read More
Tags: Research

MegaDroid projects testing mobile security at scale

  • Posted on:October 10, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

As national defense becomes an increasingly digital pursuit – and Internet security threats become increasingly mobile – researchers have decided to construct a massive test network linking together approximately 300,000 virtual Android handsets.

Read More
Tags: Research

NIST selects next encryption standard

  • Posted on:October 9, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

After five years of competition, the National Institute of Standards and Technology has selected a successor to the SHA-2 family of encryption standards.

Read More
Tags: Research

Operation Ghostclick: Cracking down on Cyber Criminals

  • Posted on:October 8, 2012
  • Posted in:Cybercrime
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Rove Digital was a company formed by a criminal organization in Estonia with two business models: one to portray itself as a legitimate business on the surface, but the second and main purpose was to profit from cyber-criminal activities, which they were extremely successful at and did for many years. At GovSec West this week,…

Read More
Tags: cyber crimecyber criminalsfraud adsghostclickResearchRove Digital

Report: Evasive malware outflanking signature-based defenses

  • Posted on:September 5, 2012
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

FireEye researchers noted nearly 400 percent year-over-year growth in advanced malware capable of bypassing signature-based detection mechanism such as firewalls, intrusion prevention systems, gateways and antivirus software.

Read More
Tags: Research

Security researcher demonstrates NFC’s potential as hacking tool

  • Posted on:August 28, 2012
  • Posted in:Current News, Spotlight
  • Posted by:
    Trend Micro
0

At a recent industry conference, security researcher Charlie Miller demonstrated how NFC technology could be used to breach certain Samsung and Nokia smartphones.

Read More
Tags: Research

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.