Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Achieving Real-Time Threat Prevention with TippingPoint Machine Learning

Earlier this week, Trend Micro announced its newest capabilities of XGen™ security covering all solutions in the Trend Micro portfolio. XGen security is a unique blend of cross-generational threat...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 6,...

A lot has changed since 2002, the first year I attended the RSA Conference. First, the event was being held in San Jose, California, which is a huge difference from the massive Moscone Center in San...

View Article

Image may be NSFW.
Clik here to view.

The Server Compute Evolution Continues…as does Trend Micro’s Market...

IDC, a leading global market intelligence firm, believes that organizations need to have access to security that moves at the speed of business. In fact, one of IDC’s leading security practice analysts...

View Article

Image may be NSFW.
Clik here to view.

Moving To Serverless Cloud Apps

One of the key benefits of the cloud is focus. Spinning up a virtual server in the cloud lets you focus on the operations and security of the operating system, you applications, and your data....

View Article


Image may be NSFW.
Clik here to view.

Devices Exposing Critical Industries and U.S. Cities

As connected devices continue to intertwine with daily life, the security of those devices and the information they process is a growing conversation. To gain a better understanding of cyber assets...

View Article

Image may be NSFW.
Clik here to view.

Bad Choices, Exposed Data

Our researchers produce a lot of really interesting material. This week, they published a paper called, “U.S. Cities Exposed In Shodan.” The research looks systems that are exposed online…exposure that...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 13,...

Love was in the air earlier this week. This past Tuesday was Valentine’s Day and what should have been Microsoft’s “Patch Tuesday,” but it was reported last month that Patch Tuesday would never be the...

View Article


Image may be NSFW.
Clik here to view.

Healthcare Under Attack: Trend Micro Reveals All in New Report

Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation...

View Article

Image may be NSFW.
Clik here to view.

Fake apps, fake games: An update on gaming malware

Malware in mobile gaming is not a new occurrence. Mobile malware itself continues to be a problem for enterprises and consumers alike, with the total number of malicious programs climbing. According to...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 20,...

I’ve been fascinated with the rise and fall of exploit kits, especially the ones that are really popular that disappear seemingly overnight. Angler was one that at one point, contributed 59.5% in the...

View Article


Image may be NSFW.
Clik here to view.

SHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry

The SHA-1 hash function is broken. This isn’t news. What is news is that a practical attack has been demonstrated  Keep in mind that “practical” is used in cryptographers terms and those terms don’t...

View Article

Taiwanese Trenders Volunteer to Help Young Students Learn to Code

In 2016, the Trend Micro Volunteers Club in Taiwan partnered with the “Program the World” project to build excitement for computer programming for students across Taiwan. “Program the World” is a...

View Article


Image may be NSFW.
Clik here to view.

Five Questions with XentIT

We sat down with Deborah Larkins, Lead Technologist at XentIT to understand her journey with being a part of the upcoming release of Deep Security 10. XentIT is a full service IT firm specializing in...

View Article

Image may be NSFW.
Clik here to view.

Takeaways from the 2016 Threat Landscape

Every year Trend Micro takes a look back at the threat landscape from the previous year and analyzes the data we receive from our massive customer base around the world and reports on the trends we saw...

View Article


Image may be NSFW.
Clik here to view.

The rise of IoT zombies: What’s the danger of botnets?

When the cyberattack on Dyn's servers happened in late 2016, several prominent websites were impacted. Organizations like Twitter and Netflix were catapulted into a state of disrepair as engineers...

View Article

Image may be NSFW.
Clik here to view.

Don’t have a New Year’s Resolution? Invest in cyber security

Companies typically set weekly, monthly and yearly goals so they can exceed different types of expectations. If you have yet to set New Year's resolutions for your business, there's still plenty of...

View Article

Image may be NSFW.
Clik here to view.

Pwn2Own – The Root of Research

Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever...

View Article
Browsing all 527 articles
Browse latest View live