• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   privacy

CTO Insights: Encryption Works – Don’t Break It!

  • Posted on:December 1, 2015 at 12:00 am
  • Posted in:Social
  • Author:Raimund Genes (Chief Technology Officer)
1

Every now and then, an ill-informed politician will stand before a microphone and say something along the lines of: encryption is helping bad guys (either terrorists, child pornographers, or other similarly acceptable target), because law enforcement can’t see what the bad guys are doing because they’re using sophisticated tools that use encryption. Said politician will urge tech companies to “work with us” to help catch these bad guys.

Read More
Tags: cryptographyencryptionprivacyterrorism

Ashley Madison, Why Do Our Honeypots Have Accounts On Your Website?

  • Posted on:September 8, 2015 at 5:00 am
  • Posted in:Social
  • Author:
    Ryan Flores (Threat Research Manager)
1

She is 33 years old, from Los Angeles, 6 feet tall, sexy, aggressive, and a “woman who knows what she wants”, according to her profile. She is intriguing. However, her intrigue doesn’t end there: her email address is one of Trend Micro’s email honeypots. Wait… what? This was how we learned that Ashley Madison users were being targeted for…

Read More
Tags: ashley madisondata breachhoneypotsprivacy

Are Secure Communications Really Secure? Government Sites Affected by Weak DHE

  • Posted on:July 10, 2015 at 7:27 am
  • Posted in:Bad Sites
  • Author:
    William Gamazo Sanchez (Vulnerability Research)
0

How secure is online public communication? Last May, a paper was published that discusses about the Diffie-Helman (DH) crypto-strength deployment, which gives strong evidence that the current DH usage is weak and suggests that 1024-bit size parameters can be broken with a nation state’s computing power resources. The paper presents possible scenarios where such an incident could occur. They found,…

Read More
Tags: cryptographyDHEHTTPSman in the middleOpenSSLprivacySSLTLS

CTO Insights: Internet of Things — Whose Data Is It, Anyway?

  • Posted on:May 26, 2015 at 12:05 am
  • Posted in:CTO Insights, Internet of Things
  • Author:Raimund Genes (Chief Technology Officer)
0

Everywhere you look, it seems to be that everything is becoming “smart”.  On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate is, and so on. At home, a smart thermostat can be controlled via an app, or even be programmed based on my own behavior….

Read More
Tags: datainternet of thingsprivacy

Is Your Data Safe In The Internet of Everything?

  • Posted on:October 15, 2014 at 12:04 am
  • Posted in:Internet of Things
  • Author:
    Geoff Grindrod (Director, Incubation)
0

I prefer using the phrase “Internet of Everything” when discussing what most people call the Internet of Things because in many ways, the latter term isn’t enough. What makes the Internet of Everything so powerful is the data about you and me that these devices can gather. Consider how these devices actually work. They almost…

Read More
Tags: data securityinternet of thingsInternet of ThingsIoEIOTprivacy
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.