Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Kids and Internet Safety: How Parents Should Have ‘The Conversation’

The World Wide Web (WWW) might not have been around when we were growing up, but it’s guaranteed to be an incredibly important part of your child’s life as they do. It’s a wonderful tool to help them...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 27,...

“Every new beginning comes from some other beginning’s end.” That’s the last line of the song “Closing Time” by the band Semisonic. The TippingPoint team is no stranger to new beginnings. Our latest...

View Article

Image may be NSFW.
Clik here to view.

How To Get The Most From Google Next 2017

Google’s Next 2017 conference kicks off today with a series of bootcamps. The regular program starts on Wednesday and runs through Friday, highlighting the latest offerings in the Google Cloud. This is...

View Article

Image may be NSFW.
Clik here to view.

Will Apple see even more cyber attacks in 2017? Experts say “yes”

For years, Apple was the gold standard when it came to cyber security while platforms like Microsoft were always under siege by cybercriminals. Consumers using Microsoft and similar products seemingly...

View Article


Image may be NSFW.
Clik here to view.

Trend Micro Protects Its Customers in 2016

Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our...

View Article

Image may be NSFW.
Clik here to view.

Deep Security 10: Customer Driven Development with TRC

Alpha, Beta… Ship! At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly...

View Article

Image may be NSFW.
Clik here to view.

How to Secure Your Enterprise

Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive...

View Article


Image may be NSFW.
Clik here to view.

The Culture of Cybercrime in West Africa

As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our...

View Article


Image may be NSFW.
Clik here to view.

To catch a hacker: The subtle mistakes of an attack

For all the benefits that it brings, new technology tends to open up a wealth of opportunities for malicious parties to compromise sensitive data. Even as businesses strive to protect themselves by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 6, 2017

According to Reference.com, the saying that “everything is bigger in Texas” likely originated as a reference to the state’s huge geographical area. Texas is second only to Alaska in size, but it is the...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Pwn2Own 2017 – Day Two Schedule and Results

With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today’s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe...

View Article


Image may be NSFW.
Clik here to view.

The Results – Pwn2Own 2017 Day One

The first day of Pwn2Own 2017 has come to a close, and so far, we’ve awarded $233,000 USD and 45 points for Master of Pwn. Today saw five successful attempts, one partial success, two failures, and two...

View Article

Image may be NSFW.
Clik here to view.

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security...

View Article


Image may be NSFW.
Clik here to view.

5 ways machine learning can be used for security today

Is your cyber security strategy mature enough to handle a sophisticated threat? Many organizations would likely say no. 2016 had "an all-time record high of 1,093 breaches", according to the Identify...

View Article

Pwn2Own 2017 – Day Three Schedule and Results

The third and final day of the largest Pwn2Own shapes up with three entries and the awarding of Master of Pwn. It’s a tight race with multiple teams still in the running. Here’s the schedule for Day...

View Article


Image may be NSFW.
Clik here to view.

The Results – Pwn2Own 2017 Day Two

The second day of competition in this year’s Pwn2Own closed out with a record 17 entries for a single day. In fact, due to the significant number of contestants registered for the 10th anniversary...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 13, 2017

There was never any doubt what my topic would be for this week’s blog. March Madness, right? Normally I’d be talking about the NCAA Basketball tournament, but not this time. Our March Madness is called...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article
Browsing all 527 articles
Browse latest View live