Apply lessons learned from Wi-Fi to help BYOD
It wasn't long ago that companies first had to figure out their Wi-Fi policies and make sure everything was secure across the network. Now, businesses are dealing with mobile devices as a...
View ArticleMalware infecting 58 million US PCs
With threats online looming larger than ever before, data security is now imperative for all users, whether at home or working in an office setting. Coming to a bill of about $4 billion, Consumer...
View ArticleHR could play leading part in BYOD success
It's a trying time to be an IT director tasked with navigating a company's move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE...
View ArticleWorkforce mobilization becoming the new normal in healthcare
Although security is always a concern within healthcare organizations, many are opting into BYOD (Bring your own Device) programs to take advantage of several undeniable productivity and efficiency...
View ArticleAttention to application security in BYOD boosts productivity, safety
The incorporation of mobile applications and adoption of a BYOD (Bring your own Device) policy likely means that organizations will see a notable rise in employee productivity levels. A report from...
View ArticleMedical offices using mobile need security policies
Healthcare, as with any other industry, is starting to see an influx of mobile devices in the workplace. TechTarget's James Brady wrote that these devices have emerged as one of the top drivers for...
View ArticleAndroid lends a hand to mobile device managers
Android hasn't been getting the most positive press as of late, as there have been heightened complaints of malware versus other operating systems, but the company may soon be winning the favor of IT...
View ArticleRussian cybercriminals turn Android malware into an industry
Google's Android mobile operating system has been a favored target of ambitious cybercriminals and a common conduit for malware distribution. The attacks on it are becoming more syndicated and...
View ArticleIs biometrics-based authentication a silver bullet for mobile security?
Apple’s recently released iPhone 5S has brought biometrics-based authentication into the mainstream. One of the new high-end smartphone’s distinctive features is its Touch ID fingerprint scanner...
View ArticleMobile banking apps must be made more secure
How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...
View ArticleHacking Team Adobe Flash Zero-Day
Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at the latest zero-day exploit affecting all versions of Adobe Flash Player. We encourage you to scroll...
View ArticleWhat you need to know about the Hacking Team Flash Zero Day
There has been a lot of discussion in the past few days about the successful attack against the Hacking Team in Italy and the release of their data as a result of that attack. The most important thing...
View ArticleTrend Micro: Proud Member of the AWS SaaS Partner Program
At Trend Micro, we’ve always prided ourselves on being innovators in security. A few years ago, we identified cloud computing as the next big trend and started investing. We invested both in building...
View ArticleThe Latest on the OPM Hack: 21 Million Affected
The United States Office of Personnel Management (OPM) has just released the latest details from their ongoing investigation into the attacks against their systems. Today’s announcement represents a...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleUpdate: Hacking Team Flash Zero Day – Not Out of the Woods
On Wednesday, Adobe released a new version of Flash on Wednesday to address the zero-day vulnerability that was disclosed as part of the Hacking Team attack last weekend. Unfortunately, our researchers...
View ArticleUpdate: The Hacking Team Flash Zero-Day Trifecta
Trend Micro’s researchers have reported a third zero-day vulnerability (CVE-2015-5123) in Adobe Flash, a result from last week’s Hacking Team attack to the Adobe Security Team. Similar to the second...
View ArticlePawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense...
Overnight, Trend Micro’s research teams identified a new attack in the ongoing Pawn Storm campaign that is focused on high-profile, sensitive targets. The Trend Micro™ Smart Protection Network™ has...
View ArticleHow Online Crime Gets Online and Stays Online: Bulletproof Hosting Services
Online crime is a big business. Various estimates put the total cost of online crime worldwide in the hundreds of billions of dollars. At Trend Micro, we’ve analyzed different aspects of online crime...
View ArticleWhat Smart Device Makers Must Do to Drive the IoT Revolution
From fitness trackers to head-mounted displays and even connected home appliances, the Internet of Things (IoT) and smart devices are commanding serious column inches in the media these days. But the...
View Article