Quantcast
Channel: Mobility
Browsing all 424 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 22, 2017

For those of you who follow the National Football League (NFL), do you remember Super Bowl 47? I wasn’t exactly thrilled about the teams that played since I’m not a 49ers or Ravens fan. What was...

View Article


Image may be NSFW.
Clik here to view.

The Jetson’s Cyber Concerns – Future Smart Cities Cybersecurity Checklist

As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of Things (IoT), there will...

View Article


Image may be NSFW.
Clik here to view.

Decade Long Partnership = Global Partner Innovation Award

Here at Trend Micro we highly value the relationships we’ve build with our partners, especially those that have spanned several years. However, it’s particularly gratifying when those partners choose...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 29, 2017

“Anything that can go wrong will go wrong.” It’s not exactly clear how Murphy’s Law originated, but it seems to always make an appearance at the one time you can’t afford for anything to go wrong. Your...

View Article


Image may be NSFW.
Clik here to view.

Bridging the Skills Gap with Trend Micro’s Capture the Flag (CTF) Competition

We all know the IT security industry is suffering from chronic skills gaps and shortages around the world. In the US things are no different, with an estimated talent shortfall of around 40,000 jobs...

View Article

Image may be NSFW.
Clik here to view.

How vulnerability research benefits both vendors and customers

Zero-day vulnerabilities – newly discovered exploits that haven’t been previously identified – are now emerging more often. Worse still is the fact that these dangerous flaws sometimes aren’t...

View Article

Image may be NSFW.
Clik here to view.

How IOC Sharing Will Help Us Build a More Secure Healthcare Sector

At Trend Micro we work hard every day to reduce the risk posed by cyber attacks from hacktavists, transnational cybercriminals, and cyber espionage groups. Nowhere is this more pertinent than in the...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 5, 2017

This week marked the first time an airline misplaced my bags for a significant period of time. Inclement weather forced me to not only change my flight, but also change airlines. Unfortunately, my...

View Article

Image may be NSFW.
Clik here to view.

Flying Under the Radar: How Hackers Use Protection Strategies for Attack

It's a recurring theme in sports movies, war stories and crime stories alike: In order to defeat the enemy, one must think like the enemy. This approach has been taken – oftentimes quite successfully...

View Article

Image may be NSFW.
Clik here to view.

Business Process Compromise: The Next Step in Advanced Targeted Attacks

Targeted attacks have come a long way in recent years, leveraging increasingly advanced techniques aimed at specific individuals. Often, these hackers pinpoint a single person within an enterprise,...

View Article

Image may be NSFW.
Clik here to view.

Can YOU spot the fake?

As we predicted in 2016, cyberpropaganda is a major growth area for cybercriminals. Per that prediction, “The rise in the Internet penetration has opened the opportunity for invested parties to use the...

View Article


Image may be NSFW.
Clik here to view.

FIRST and Beyond – a History of Elevating Research through Partnerships

At the FIRST conference in San Juan, Trend Micro’s Forward-looking Threat Research team will be presenting four sessions on a wide range of topics. These sessions will demonstrate a sliver of the...

View Article

Image may be NSFW.
Clik here to view.

Linux is secure…right?

“There are no threats for Linux servers. Aren’t they built to be secure?” “Linux servers are secure and hardened, why do we need additional security controls on those?” “I do understand there are...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 12, 2017

“What can you sit on, sleep on, and brush your teeth with?” This was the question posed to Steve Martin’s character C.D. Bales in the 1987 movie Roxanne. In a modern take of Edmond Rostand’s 1897 verse...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

Ransomware & Advanced Attacks: Servers are Different

Ransomware and other advanced attacks are the scourge of the modern IT security team. If allowed to gain access to your IT environment, these attacks could shut down the organization, denying access to...

View Article

Image may be NSFW.
Clik here to view.

Tradition and Technology: Trend Micro Takes to the Water for Dragon Boat...

At Trend Micro, we’re used to fighting it out against a constant barrage of cyber threats facing our customers. But we don’t just want to be number one in cybersecurity: We’re also highly competitive...

View Article

Image may be NSFW.
Clik here to view.

Bringing Data Center Security to Cloud Speed

Last week, while visiting the product management team for Deep Security, I asked about their latest release. They surprised me by saying the big news is that there IS a release. Confused, I asked them...

View Article
Browsing all 424 articles
Browse latest View live