TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 22,...
Yesterday, the Zero Day Initiative (ZDI) announced the dates and contest rules for Pwn2Own 2018. Last year, we celebrated the 10th anniversary of the event and the 11th year is going to be bigger than...
View ArticleYour startup disk is almost full – How you can fix it on your Mac
Every Mac user will experience the message “Your startup disk is almost full” at one time or another. Understanding what “startup disk is full” actually means is the first important step before you can...
View ArticleHow your enterprise applications could be putting your company at risk
The typical company, large or small, depends on a number of different enterprise applications in order to ensure that employees can complete critical, daily tasks. Apps like those for enterprise...
View ArticleTrend Micro Named a Leader in Gartner Magic Quadrant for Endpoint Protection...
The endpoint security market is quite dynamic right now, with lots of new entrants, and ongoing innovation for improving threat detection and response. In the midst of all this market energy we are...
View ArticleA Top Employer in Canada for the Second Year in a Row
Trend Micro has been protecting governments, businesses and consumers from cyber-threats for more than 28 years. Right from the start, our founders were keen to emphasize the important role played by...
View ArticleThe Evolution of Ransomware
While many businesses and individual users understand that ransomware isn't a new threat, many don't actually know how long this particular infection style has been utilized by hackers. The first...
View ArticleData Privacy in the Age of IoT
On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what...
View ArticleThis Week in Security News: Magic Quadrants & Global Threats
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Gartner released its Magic Quadrant Leaders,...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 29,...
Late last year, Trend Micro introduced its Security Predictions for 2018. One of the predictions stated that digital extortion will be at the core of most cybercriminals’ business model. It’s much more...
View ArticleHow hackers recycle top threats
Developers are known for reusing pieces of code over and over again – after all, if it isn't broke, why fix it? In fact, this is what makes open source programs so popular and valuable – as opposed to...
View ArticleA Look Back: Reviewing the Worst Cyber Attacks of 2017 and the Lessons Learned
It seems that each year that passes is worse than the last in terms of hacking and cyber attacks, and 2017 was no exception. “Surprising no one, 2017 was marked another ‘worst year ever’ in data...
View ArticleSecurity Glue Between the Silos of Endpoint, Server, Cloud and Network...
Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to...
View ArticleThis Week in Security News: Botnets and Breaches
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 5,...
It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to...
View ArticleMobile banking apps must be made more secure
How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...
View ArticleWeb browsers remain gateways for malware
Web browsers became widely used from the mid 1990s onward, following the early success of Netscape Navigator and the subsequent rise of Microsoft Internet Explorer as the default option on millions of...
View ArticleTax season security threats: TorrentLocker
Tax season brings different meanings for different groups of people. For employers, this is the time of year when they need to ensure that tax information for their staff is in order and that they...
View ArticleCyber security: The cooperation game
Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...
View ArticleWhat lies beneath: The deep web and future crimes
The Internet is like an iceberg: There's the part that's visible, and then there's the rest. When we use the Internet, we regard it as a vast, limitless expanse of data. And yet the Internet that we're...
View ArticleBYOD security: Dealing with targeted attacks and zombie apps on mobile
Mobile security continues to be a challenging frontier for enterprises, many of which have only recently adopted bring-your-own-device policies and are still in the process of overhauling their...
View Article