Towards a Safer Internet for All: Winners of New Brunswick Video Contest...
Today more than ever, society needs to come together to work towards a better and safer future for all our children. This doesn’t just mean members of the public: companies can and should play a key...
View ArticleTrend Micro Security’s Layered Protection, XGen™ Machine Learning, and Folder...
On May 12 of 2017, the WannaCry ransomware struck across the globe, encrypting computers by exploiting a critical vulnerability in Windows, first discovered by the US National Security Agency. Among...
View ArticleIoT Device Security At Home
My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security...
View ArticleRansomware Updates: Newest Threats, Protection Best Practices
Ransomware has consistently been in the spotlight since attacks first began emerging a few years ago. Now that new and powerful samples like WannaCry are being used to infiltrate large-scale...
View ArticleSupporting Healthcare Organizations Through IT Recovery
As we all return to work from the summer holidays, we at Trend Micro reflect on what we have seen in the threat landscape over the first six months of 2017 with the release of our 2017 Mid-Year...
View ArticleThe Equifax Data Breach: What Do I Do Next?
On 8 September, credit reporting agency Equifax confessed to a major data breach. It affects 143 million Americans – nearly half of the US population – and 100,000 Canadian consumers. Unfortunately,...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...
The Morton Salt slogan “When it rains it pours” refers to its free flowing salt with a pouring spot and is a variation of the proverb “It never rains but it pours.” Unfortunately, Mother Nature has...
View ArticleThe New Email Security Technologies Powered by XGen™
Today we are excited to introduce new email security technologies powered by XGen™ and a new product, Smart Protection for Office 365. This new service combines the advantages of both an email gateway...
View ArticleEndpoint isn’t the best place to block threats
Hackers often look for a number of ways to target business users, compromise critical systems and get away with sensitive information or money. These attacks can come from email and web sources, and...
View ArticleAttack The Machines: The lucrative business of ATM malware
Trend Micro and Europol’s European Cybercrime Centre (EC3) today released a publicly available report on the ATM malware landscape. This builds on the 2016 report that was privately released to...
View ArticleHelping Mobile Operators Keep Customers Safe with Virtualized Network Security
At Trend Micro we’re always looking for innovative new ways to support our customers and help overcome their cybersecurity challenges. Mobile network operators (MNOs) are increasingly adopting...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...
A couple of years back, I remember working at a tradeshow booth and giving a demo to someone who was interested in our solution. He said, “Your solution is great, but I need something that will not let...
View ArticleNational Cyber Security Awareness Month for Organizations
The month of October 2017 is again the National Cyber Security Awareness Month (NCSAM) for individuals and organizations. This year’s theme is shared responsibility which is something we’ve been...
View ArticleTaking Healthcare Threat Protection to the Next Level with HITRUST
Healthcare organizations (HCOs) worldwide continue to be on the receiving end of cyber-attacks. But if we work together we have both the tools and motivation to turn this around. That’s why Trend Micro...
View ArticleWhen Phishing Starts from the Inside
A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 2, 2017
Have you ever read something online and you read a word as something else? Sometimes the weight of our eyelids makes our eyes deceive us after hours staring at a computer screen. As I stated to read a...
View ArticleBargains and brotherhood: The underground Digital Souks of the Middle East
The release of our report “Digital Souks: A glimpse into the Middle Eastern and North African underground” marks the 12th in our Cybercriminal Underground Economy Series (CUES). Having previously...
View Article