Quantcast
Channel: Mobility
Viewing all articles
Browse latest Browse all 424

This Week in Security News

$
0
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!

 

Experts Say Apple Will See Even More Cyberattacks in 2017

For years, Apple was the gold standard when it came to cybersecurity while platforms like Microsoft were always under siege by cybercriminals. But those days are dwindling fast. Trend Micro noted that Apple is being targeted more than ever before by hackers. 

Apache Struts Two Vulnerability Leads to Remote Code Execution

Apache Struts is a free and open-source framework used to build Java web applications. We looked into past several Remote Code Execution (RCE) vulnerabilities reported in Apache Struts, and observed that in most of them, attackers have used Object Graph Navigation Language (OGNL) expressions. 

Open Backdoors Present Another Challenge for IoT

Problems with hardcoded credentials are hitting consumer IoT devicesindustrial SCADA devices, and even critical infrastructure. Despite the appeal on source code and firmware audition, this type of vulnerability recurs and threatens users’ privacy and data security. 

New Report Takes a Closer Look at Cybercrime in West Africa

Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our ongoing partnership with INTERPOL to provide survey data and a deeper understanding of the region’s cybercriminal ecosystem. 

Ransomware Attack Locks State Senators out of Their Computers

The attack, believed to be the first such on a state legislative party organization, was discovered on the morning of March 3. After malware infected the legislative party’s computer systems, the hackers demanded a ransom payment in bitcoin to remove the virus and unlock the files and data. 

Secure Your Enterprise

Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these threats has escalated. 

Health Industry Plays Catch-up on Cybersecurity

Hospitals and other medical businesses have worked to adopt modern information technology, including electronic health records. But at the same time, they are falling behind in the cybersecurity needed to protect confidential patient data and networks. 

Trend Micro Protected Its Customers in 2016

Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our global threat intelligence resides and where we provide much of our protection capabilities for our customers.

Cybersecurity Salaries for Sales Engineers Soar in 2017

In the top five major metros – New York, Los Angeles, Chicago, Houston, and Philadelphia – experienced cybersecurity engineers with more than eight years of experience are earning an average annual salary of $135,000. 

Trend Micro Is Conducting 2017 What’s Your Story Youth Video Contest

This contest is about having a great message but also about being a good messenger.  Let your friends, family, neighbors, classmates, and others know about your video.  Share it on social media, websites, email, text, or in person!  

Deep Security 10 Performs Customer Driven Development

We recently shared how Deep Security 10 is an example of server security standing the test of time but it was also the first release without a Beta! Why does this matter? Instead of being consulted after the fact, many lead customers were involved directly with shaping major features during development.

Pwn2Own – The Root of Research

Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever been spilt. It has helped launch people’s careers, or at the very least, it has helped increase their notoriety. It’s been accused of crushing souls of fanbois and haters alike.

Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.


Viewing all articles
Browse latest Browse all 424

Trending Articles