Quantcast
Channel: Mobility
Browsing all 424 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

To catch a hacker: The subtle mistakes of an attack

For all the benefits that it brings, new technology tends to open up a wealth of opportunities for malicious parties to compromise sensitive data. Even as businesses strive to protect themselves by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 6, 2017

According to Reference.com, the saying that “everything is bigger in Texas” likely originated as a reference to the state’s huge geographical area. Texas is second only to Alaska in size, but it is the...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

The View from DVLabs – Pwn2Own 2017

This blog will be updated throughout the competition so keep tracking for the latest updates! A global outbreak of bigger bugs. Badder bugs. And they’re threatening the world as we know it. Yes, it...

View Article

Pwn2Own 2017 – Day Two Schedule and Results

With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today’s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe...

View Article


Image may be NSFW.
Clik here to view.

The Results – Pwn2Own 2017 Day One

The first day of Pwn2Own 2017 has come to a close, and so far, we’ve awarded $233,000 USD and 45 points for Master of Pwn. Today saw five successful attempts, one partial success, two failures, and two...

View Article

Image may be NSFW.
Clik here to view.

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security...

View Article

Image may be NSFW.
Clik here to view.

5 ways machine learning can be used for security today

Is your cyber security strategy mature enough to handle a sophisticated threat? Many organizations would likely say no. 2016 had "an all-time record high of 1,093 breaches", according to the Identify...

View Article


Pwn2Own 2017 – Day Three Schedule and Results

The third and final day of the largest Pwn2Own shapes up with three entries and the awarding of Master of Pwn. It’s a tight race with multiple teams still in the running. Here’s the schedule for Day...

View Article


Image may be NSFW.
Clik here to view.

The Results – Pwn2Own 2017 Day Two

The second day of competition in this year’s Pwn2Own closed out with a record 17 entries for a single day. In fact, due to the significant number of contestants registered for the 10th anniversary...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 13, 2017

There was never any doubt what my topic would be for this week’s blog. March Madness, right? Normally I’d be talking about the NCAA Basketball tournament, but not this time. Our March Madness is called...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

3 Steps To Take For Social Media Account Security

Social media is a tough place for companies. That’s understandable. The idea of connecting people to each other breaks down when one of those people is a major multi-national brand. But there is a...

View Article


Image may be NSFW.
Clik here to view.

The Results – Pwn2Own Day Three

Our final day of Pwn2Own 2017 came to a close with some amazing research. The contest had never previously required a 3rd day of competition, but with our largest ever number of registrations,...

View Article

Image may be NSFW.
Clik here to view.

What is the role of the Chief Information Security Officer?

Are your IT security initiatives manned by an experienced Chief Information Security Officer or led by a supervisor who has little to no cyber security experience? There's a difference between the two...

View Article


Image may be NSFW.
Clik here to view.

What modern cyber attacks actually look like

Sometimes, your data protection tools may actually be providing a false sense of security. A Venafi survey of 500 CIOs found that they were wasting millions of dollars on cyber security solutions that...

View Article

Image may be NSFW.
Clik here to view.

Hackers Attempt To Extort Apple

Cybercrime is a business. Professional criminals refine their processes, measure performance, and regularly evaluate the return on their investments. Every move is strategic. We see this time and time...

View Article


Image may be NSFW.
Clik here to view.

CeBIT 2017: 27 Years In The Making for Trend Micro

As I entered CeBIT 2017 on Monday, a nostalgic wave hit me. I was reminded of my first trip to this conference 27 years ago, shortly after we founded Trend Micro. Walking in that day, floppy disks and...

View Article

Image may be NSFW.
Clik here to view.

Paying for ransomware could cost you more than just the ransom

Ransomware attacks are now incredibly sophisticated and occurring with increasing frequency.  In fact, many called 2016 "the year of ransomware," and for good reason: Trend Micro found there were 752...

View Article

Image may be NSFW.
Clik here to view.

The S In HTTPS

If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. The S in HTTPS. SSL/TLS...

View Article
Browsing all 424 articles
Browse latest View live