Kids and Internet Safety: How Parents Should Have ‘The Conversation’
The World Wide Web (WWW) might not have been around when we were growing up, but it’s guaranteed to be an incredibly important part of your child’s life as they do. It’s a wonderful tool to help them...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 27,...
“Every new beginning comes from some other beginning’s end.” That’s the last line of the song “Closing Time” by the band Semisonic. The TippingPoint team is no stranger to new beginnings. Our latest...
View ArticleHow To Get The Most From Google Next 2017
Google’s Next 2017 conference kicks off today with a series of bootcamps. The regular program starts on Wednesday and runs through Friday, highlighting the latest offerings in the Google Cloud. This is...
View ArticleWill Apple see even more cyber attacks in 2017? Experts say “yes”
For years, Apple was the gold standard when it came to cyber security while platforms like Microsoft were always under siege by cybercriminals. Consumers using Microsoft and similar products seemingly...
View ArticleTrend Micro Protects Its Customers in 2016
Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our...
View ArticleDeep Security 10: Customer Driven Development with TRC
Alpha, Beta… Ship! At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly...
View ArticleHow to Secure Your Enterprise
Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive...
View ArticleThe Culture of Cybercrime in West Africa
As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our...
View ArticleTo catch a hacker: The subtle mistakes of an attack
For all the benefits that it brings, new technology tends to open up a wealth of opportunities for malicious parties to compromise sensitive data. Even as businesses strive to protect themselves by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 6, 2017
According to Reference.com, the saying that “everything is bigger in Texas” likely originated as a reference to the state’s huge geographical area. Texas is second only to Alaska in size, but it is the...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticlePwn2Own 2017 – Day Two Schedule and Results
With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today’s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe...
View ArticleThe Results – Pwn2Own 2017 Day One
The first day of Pwn2Own 2017 has come to a close, and so far, we’ve awarded $233,000 USD and 45 points for Master of Pwn. Today saw five successful attempts, one partial success, two failures, and two...
View Article3 overlooked endpoints for cyber attacks and how to protect them
You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security...
View Article5 ways machine learning can be used for security today
Is your cyber security strategy mature enough to handle a sophisticated threat? Many organizations would likely say no. 2016 had "an all-time record high of 1,093 breaches", according to the Identify...
View ArticlePwn2Own 2017 – Day Three Schedule and Results
The third and final day of the largest Pwn2Own shapes up with three entries and the awarding of Master of Pwn. It’s a tight race with multiple teams still in the running. Here’s the schedule for Day...
View ArticleThe Results – Pwn2Own 2017 Day Two
The second day of competition in this year’s Pwn2Own closed out with a record 17 entries for a single day. In fact, due to the significant number of contestants registered for the 10th anniversary...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 13, 2017
There was never any doubt what my topic would be for this week’s blog. March Madness, right? Normally I’d be talking about the NCAA Basketball tournament, but not this time. Our March Madness is called...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View Article