To catch a hacker: The subtle mistakes of an attack
For all the benefits that it brings, new technology tends to open up a wealth of opportunities for malicious parties to compromise sensitive data. Even as businesses strive to protect themselves by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 6, 2017
According to Reference.com, the saying that “everything is bigger in Texas” likely originated as a reference to the state’s huge geographical area. Texas is second only to Alaska in size, but it is the...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleThe View from DVLabs – Pwn2Own 2017
This blog will be updated throughout the competition so keep tracking for the latest updates! A global outbreak of bigger bugs. Badder bugs. And they’re threatening the world as we know it. Yes, it...
View ArticlePwn2Own 2017 – Day Two Schedule and Results
With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today’s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe...
View ArticleThe Results – Pwn2Own 2017 Day One
The first day of Pwn2Own 2017 has come to a close, and so far, we’ve awarded $233,000 USD and 45 points for Master of Pwn. Today saw five successful attempts, one partial success, two failures, and two...
View Article3 overlooked endpoints for cyber attacks and how to protect them
You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security...
View Article5 ways machine learning can be used for security today
Is your cyber security strategy mature enough to handle a sophisticated threat? Many organizations would likely say no. 2016 had "an all-time record high of 1,093 breaches", according to the Identify...
View ArticlePwn2Own 2017 – Day Three Schedule and Results
The third and final day of the largest Pwn2Own shapes up with three entries and the awarding of Master of Pwn. It’s a tight race with multiple teams still in the running. Here’s the schedule for Day...
View ArticleThe Results – Pwn2Own 2017 Day Two
The second day of competition in this year’s Pwn2Own closed out with a record 17 entries for a single day. In fact, due to the significant number of contestants registered for the 10th anniversary...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 13, 2017
There was never any doubt what my topic would be for this week’s blog. March Madness, right? Normally I’d be talking about the NCAA Basketball tournament, but not this time. Our March Madness is called...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View Article3 Steps To Take For Social Media Account Security
Social media is a tough place for companies. That’s understandable. The idea of connecting people to each other breaks down when one of those people is a major multi-national brand. But there is a...
View ArticleThe Results – Pwn2Own Day Three
Our final day of Pwn2Own 2017 came to a close with some amazing research. The contest had never previously required a 3rd day of competition, but with our largest ever number of registrations,...
View ArticleWhat is the role of the Chief Information Security Officer?
Are your IT security initiatives manned by an experienced Chief Information Security Officer or led by a supervisor who has little to no cyber security experience? There's a difference between the two...
View ArticleWhat modern cyber attacks actually look like
Sometimes, your data protection tools may actually be providing a false sense of security. A Venafi survey of 500 CIOs found that they were wasting millions of dollars on cyber security solutions that...
View ArticleHackers Attempt To Extort Apple
Cybercrime is a business. Professional criminals refine their processes, measure performance, and regularly evaluate the return on their investments. Every move is strategic. We see this time and time...
View ArticleCeBIT 2017: 27 Years In The Making for Trend Micro
As I entered CeBIT 2017 on Monday, a nostalgic wave hit me. I was reminded of my first trip to this conference 27 years ago, shortly after we founded Trend Micro. Walking in that day, floppy disks and...
View ArticlePaying for ransomware could cost you more than just the ransom
Ransomware attacks are now incredibly sophisticated and occurring with increasing frequency. In fact, many called 2016 "the year of ransomware," and for good reason: Trend Micro found there were 752...
View ArticleThe S In HTTPS
If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. The S in HTTPS. SSL/TLS...
View Article