Healthcare Under Attack: Trend Micro Reveals All in New Report
Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation...
View ArticleFake apps, fake games: An update on gaming malware
Malware in mobile gaming is not a new occurrence. Mobile malware itself continues to be a problem for enterprises and consumers alike, with the total number of malicious programs climbing. According to...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 20,...
I’ve been fascinated with the rise and fall of exploit kits, especially the ones that are really popular that disappear seemingly overnight. Angler was one that at one point, contributed 59.5% in the...
View ArticleSHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry
The SHA-1 hash function is broken. This isn’t news. What is news is that a practical attack has been demonstrated Keep in mind that “practical” is used in cryptographers terms and those terms don’t...
View ArticleTaiwanese Trenders Volunteer to Help Young Students Learn to Code
In 2016, the Trend Micro Volunteers Club in Taiwan partnered with the “Program the World” project to build excitement for computer programming for students across Taiwan. “Program the World” is a...
View ArticleFive Questions with XentIT
We sat down with Deborah Larkins, Lead Technologist at XentIT to understand her journey with being a part of the upcoming release of Deep Security 10. XentIT is a full service IT firm specializing in...
View ArticleTakeaways from the 2016 Threat Landscape
Every year Trend Micro takes a look back at the threat landscape from the previous year and analyzes the data we receive from our massive customer base around the world and reports on the trends we saw...
View ArticleThe rise of IoT zombies: What’s the danger of botnets?
When the cyberattack on Dyn's servers happened in late 2016, several prominent websites were impacted. Organizations like Twitter and Netflix were catapulted into a state of disrepair as engineers...
View ArticleDon’t have a New Year’s Resolution? Invest in cyber security
Companies typically set weekly, monthly and yearly goals so they can exceed different types of expectations. If you have yet to set New Year's resolutions for your business, there's still plenty of...
View ArticlePwn2Own – The Root of Research
Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever...
View ArticleKids and Internet Safety: How Parents Should Have ‘The Conversation’
The World Wide Web (WWW) might not have been around when we were growing up, but it’s guaranteed to be an incredibly important part of your child’s life as they do. It’s a wonderful tool to help them...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 27,...
“Every new beginning comes from some other beginning’s end.” That’s the last line of the song “Closing Time” by the band Semisonic. The TippingPoint team is no stranger to new beginnings. Our latest...
View ArticleHow To Get The Most From Google Next 2017
Google’s Next 2017 conference kicks off today with a series of bootcamps. The regular program starts on Wednesday and runs through Friday, highlighting the latest offerings in the Google Cloud. This is...
View ArticleWill Apple see even more cyber attacks in 2017? Experts say “yes”
For years, Apple was the gold standard when it came to cyber security while platforms like Microsoft were always under siege by cybercriminals. Consumers using Microsoft and similar products seemingly...
View ArticleTrend Micro Protects Its Customers in 2016
Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our...
View ArticleDeep Security 10: Customer Driven Development with TRC
Alpha, Beta… Ship! At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly...
View ArticleHow to Secure Your Enterprise
Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive...
View ArticleThe Culture of Cybercrime in West Africa
As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our...
View Article