Quantcast
Channel: Mobility
Browsing all 424 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Healthcare Under Attack: Trend Micro Reveals All in New Report

Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation...

View Article


Image may be NSFW.
Clik here to view.

Fake apps, fake games: An update on gaming malware

Malware in mobile gaming is not a new occurrence. Mobile malware itself continues to be a problem for enterprises and consumers alike, with the total number of malicious programs climbing. According to...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 20,...

I’ve been fascinated with the rise and fall of exploit kits, especially the ones that are really popular that disappear seemingly overnight. Angler was one that at one point, contributed 59.5% in the...

View Article

Image may be NSFW.
Clik here to view.

SHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry

The SHA-1 hash function is broken. This isn’t news. What is news is that a practical attack has been demonstrated  Keep in mind that “practical” is used in cryptographers terms and those terms don’t...

View Article


Taiwanese Trenders Volunteer to Help Young Students Learn to Code

In 2016, the Trend Micro Volunteers Club in Taiwan partnered with the “Program the World” project to build excitement for computer programming for students across Taiwan. “Program the World” is a...

View Article

Image may be NSFW.
Clik here to view.

Five Questions with XentIT

We sat down with Deborah Larkins, Lead Technologist at XentIT to understand her journey with being a part of the upcoming release of Deep Security 10. XentIT is a full service IT firm specializing in...

View Article

Image may be NSFW.
Clik here to view.

Takeaways from the 2016 Threat Landscape

Every year Trend Micro takes a look back at the threat landscape from the previous year and analyzes the data we receive from our massive customer base around the world and reports on the trends we saw...

View Article


Image may be NSFW.
Clik here to view.

The rise of IoT zombies: What’s the danger of botnets?

When the cyberattack on Dyn's servers happened in late 2016, several prominent websites were impacted. Organizations like Twitter and Netflix were catapulted into a state of disrepair as engineers...

View Article


Image may be NSFW.
Clik here to view.

Don’t have a New Year’s Resolution? Invest in cyber security

Companies typically set weekly, monthly and yearly goals so they can exceed different types of expectations. If you have yet to set New Year's resolutions for your business, there's still plenty of...

View Article

Image may be NSFW.
Clik here to view.

Pwn2Own – The Root of Research

Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever...

View Article

Image may be NSFW.
Clik here to view.

Kids and Internet Safety: How Parents Should Have ‘The Conversation’

The World Wide Web (WWW) might not have been around when we were growing up, but it’s guaranteed to be an incredibly important part of your child’s life as they do. It’s a wonderful tool to help them...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 27,...

“Every new beginning comes from some other beginning’s end.” That’s the last line of the song “Closing Time” by the band Semisonic. The TippingPoint team is no stranger to new beginnings. Our latest...

View Article

Image may be NSFW.
Clik here to view.

How To Get The Most From Google Next 2017

Google’s Next 2017 conference kicks off today with a series of bootcamps. The regular program starts on Wednesday and runs through Friday, highlighting the latest offerings in the Google Cloud. This is...

View Article


Image may be NSFW.
Clik here to view.

Will Apple see even more cyber attacks in 2017? Experts say “yes”

For years, Apple was the gold standard when it came to cyber security while platforms like Microsoft were always under siege by cybercriminals. Consumers using Microsoft and similar products seemingly...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro Protects Its Customers in 2016

Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our...

View Article


Image may be NSFW.
Clik here to view.

Deep Security 10: Customer Driven Development with TRC

Alpha, Beta… Ship! At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly...

View Article

Image may be NSFW.
Clik here to view.

How to Secure Your Enterprise

Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive...

View Article

Image may be NSFW.
Clik here to view.

The Culture of Cybercrime in West Africa

As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our...

View Article
Browsing all 424 articles
Browse latest View live