Quantcast
Channel: Mobility
Browsing all 424 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 22,...

Yesterday, the Zero Day Initiative (ZDI) announced the dates and contest rules for Pwn2Own 2018. Last year, we celebrated the 10th anniversary of the event and the 11th year is going to be bigger than...

View Article


Image may be NSFW.
Clik here to view.

Your startup disk is almost full – How you can fix it on your Mac

Every Mac user will experience the message “Your startup disk is almost full” at one time or another. Understanding what “startup disk is full” actually means is the first important step before you can...

View Article


Image may be NSFW.
Clik here to view.

How your enterprise applications could be putting your company at risk

The typical company, large or small, depends on a number of different enterprise applications in order to ensure that employees can complete critical, daily tasks. Apps like those for enterprise...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro Named a Leader in Gartner Magic Quadrant for Endpoint Protection...

The endpoint security market is quite dynamic right now, with lots of new entrants, and ongoing innovation for improving threat detection and response. In the midst of all this market energy we are...

View Article

Image may be NSFW.
Clik here to view.

A Top Employer in Canada for the Second Year in a Row

Trend Micro has been protecting governments, businesses and consumers from cyber-threats for more than 28 years. Right from the start, our founders were keen to emphasize the important role played by...

View Article


Image may be NSFW.
Clik here to view.

The Evolution of Ransomware

While many businesses and individual users understand that ransomware isn't a new threat, many don't actually know how long this particular infection style has been utilized by hackers. The first...

View Article

Image may be NSFW.
Clik here to view.

Data Privacy in the Age of IoT

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News: Magic Quadrants & Global Threats

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Gartner released its Magic Quadrant Leaders,...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 29,...

Late last year, Trend Micro introduced its Security Predictions for 2018. One of the predictions stated that digital extortion will be at the core of most cybercriminals’ business model. It’s much more...

View Article


Image may be NSFW.
Clik here to view.

How hackers recycle top threats

Developers are known for reusing pieces of code over and over again – after all, if it isn't broke, why fix it? In fact, this is what makes open source programs so popular and valuable – as opposed to...

View Article

Image may be NSFW.
Clik here to view.

A Look Back: Reviewing the Worst Cyber Attacks of 2017 and the Lessons Learned

It seems that each year that passes is worse than the last in terms of hacking and cyber attacks, and 2017 was no exception. “Surprising no one, 2017 was marked another ‘worst year ever’ in data...

View Article

Image may be NSFW.
Clik here to view.

Security Glue Between the Silos of Endpoint, Server, Cloud and Network...

Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News: Botnets and Breaches

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 5,...

It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to...

View Article

Image may be NSFW.
Clik here to view.

Mobile banking apps must be made more secure

How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...

View Article


Image may be NSFW.
Clik here to view.

Web browsers remain gateways for malware

Web browsers became widely used from the mid 1990s onward, following the early success of Netscape Navigator and the subsequent rise of Microsoft Internet Explorer as the default option on millions of...

View Article

Image may be NSFW.
Clik here to view.

Tax season security threats: TorrentLocker

Tax season brings different meanings for different groups of people. For employers, this is the time of year when they need to ensure that tax information for their staff is in order and that they...

View Article


Image may be NSFW.
Clik here to view.

Cyber security: The cooperation game

Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...

View Article

Image may be NSFW.
Clik here to view.

What lies beneath: The deep web and future crimes

The Internet is like an iceberg: There's the part that's visible, and then there's the rest. When we use the Internet, we regard it as a vast, limitless expanse of data. And yet the Internet that we're...

View Article

Image may be NSFW.
Clik here to view.

BYOD security: Dealing with targeted attacks and zombie apps on mobile

Mobile security continues to be a challenging frontier for enterprises, many of which have only recently adopted bring-your-own-device policies and are still in the process of overhauling their...

View Article
Browsing all 424 articles
Browse latest View live