• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   CTO Insights

LinkedIn Breach: More Questions than Answers

  • Posted on:May 20, 2016 at 12:10 am
  • Posted in:CTO Insights, Social, Targeted Attacks
  • Author:Raimund Genes (Chief Technology Officer)
0

Earlier this week, it was reported that the 2012 breach of LinkedIn was far worse than originally thought: instead of the 6.5 million stolen records that were reported at the time, it turned out that 167 million users were affected. 117 million of these records contained the user’s email address and password.

It wasn’t until this bigger breach was sold in dark web communities that everyone became aware of this bigger problem. LinkedIn issued a blog post that confirmed the leaked data was authentic and asked affected users to reset their passwords.

Read More
Tags: CTO Insightsdata breachLinkedIn

CTO Insights: Defending Your Organization From Insider Attacks

  • Posted on:April 27, 2015 at 7:40 pm
  • Posted in:CTO Insights, Targeted Attacks
  • Author:Raimund Genes (Chief Technology Officer)
0

If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received years ago – turns against an organization and inflicts significant damage. Sometimes the insider is on the side of the good guys,…

Read More
Tags: CTO Insightsinsider attacks

CTO Insights: Vulnerabilities for Sale

  • Posted on:March 16, 2015 at 8:32 am
  • Posted in:CTO Insights, Vulnerabilities
  • Author:Raimund Genes (Chief Technology Officer)
0

2014 showed that vulnerabilities could be found in all applications – both Heartbleed and Shellshock caught system administrators off-guard by revealing that open-source server applications could have severe vulnerabilities as well. The reality is that making software free from vulnerabilities is difficult and expensive, if not completely impossible. For every thousand lines of code, you can…

Read More
Tags: CTO Insights

CTO Insights: Light Can Keep the Dark at Bay

  • Posted on:February 9, 2015 at 4:21 am
  • Posted in:CTO Insights, Vulnerabilities
  • Author:Raimund Genes (Chief Technology Officer)
1

We are all afraid of the unknown.  Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We love to know what’s ahead of us. We are hard wired like this. As far…

Read More
Tags: CTO Insightsresponsible disclosureVulnerabilities

Mobile Virtualization – Solving the BYOD Problem

  • Posted on:January 12, 2015 at 10:23 am
  • Posted in:CTO Insights, Mobile
  • Author:Raimund Genes (Chief Technology Officer)
0

For many users today, how they use technology is defined by mobile devices. Their primary device is not a desktop computer, or even a laptop. Instead, it’s a tablet or a smartphone. Instead of data stored on a hard drive or a USB stick, corporate data is now stored in the cloud and accessed as…

Read More
Tags: bring your own deviceBYODconsumerizationCTO Insightsmobile virtualizationVDIVMI
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.