TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 15,...
It’s been just over 14 years since I almost left this crazy world due to a bad car accident. I have a number of scars and daily pains that serve as reminders of that day. While some may think scars and...
View ArticleHow to Fix a Mac That’s Running Slow
Every device sooner or later begins to run slower and slower. Even the Mac, which is a highly-efficient Apple product, starts to slow down and becomes a real pain to use over time. If you are a heavy...
View ArticleWhy Stand-Alone IDPS Matters More Than Ever, and the 2018 Gartner Magic Quadrant
First, What is IDPS and Why Do We Care? Intrusion Prevention Systems (IPS) emerged as an improvement on Intrusion Detection Systems (IDS). IDS are out-of-band collectors of network traffic that...
View Article3 reasons the ransomware threat will continue in 2018
Ransomware has been on the scene for more than a decade now, and thanks to increasingly sophisticated samples that attack victims across nearly every country, it’s become a global threat. According to...
View ArticleGot AV? Good Start! Now it’s Time to Protect Your Entire Family
We all know cyberspace can be a scary place. That’s why Trend Micro is here to protect your digital life with a range of comprehensive security products. But we’ve noticed that some of our customers...
View ArticleThis Week in Security News: Trojans and Cyber Hacks
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Read on for the latest on trojanized malware, smart...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 22,...
Yesterday, the Zero Day Initiative (ZDI) announced the dates and contest rules for Pwn2Own 2018. Last year, we celebrated the 10th anniversary of the event and the 11th year is going to be bigger than...
View ArticleYour startup disk is almost full – How you can fix it on your Mac
Every Mac user will experience the message “Your startup disk is almost full” at one time or another. Understanding what “startup disk is full” actually means is the first important step before you can...
View ArticleHow your enterprise applications could be putting your company at risk
The typical company, large or small, depends on a number of different enterprise applications in order to ensure that employees can complete critical, daily tasks. Apps like those for enterprise...
View ArticleTrend Micro Named a Leader in Gartner Magic Quadrant for Endpoint Protection...
The endpoint security market is quite dynamic right now, with lots of new entrants, and ongoing innovation for improving threat detection and response. In the midst of all this market energy we are...
View ArticleA Top Employer in Canada for the Second Year in a Row
Trend Micro has been protecting governments, businesses and consumers from cyber-threats for more than 28 years. Right from the start, our founders were keen to emphasize the important role played by...
View ArticleThe Evolution of Ransomware
While many businesses and individual users understand that ransomware isn't a new threat, many don't actually know how long this particular infection style has been utilized by hackers. The first...
View ArticleData Privacy in the Age of IoT
On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what...
View ArticleThis Week in Security News: Magic Quadrants & Global Threats
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Gartner released its Magic Quadrant Leaders,...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 29,...
Late last year, Trend Micro introduced its Security Predictions for 2018. One of the predictions stated that digital extortion will be at the core of most cybercriminals’ business model. It’s much more...
View ArticleHow hackers recycle top threats
Developers are known for reusing pieces of code over and over again – after all, if it isn't broke, why fix it? In fact, this is what makes open source programs so popular and valuable – as opposed to...
View ArticleA Look Back: Reviewing the Worst Cyber Attacks of 2017 and the Lessons Learned
It seems that each year that passes is worse than the last in terms of hacking and cyber attacks, and 2017 was no exception. “Surprising no one, 2017 was marked another ‘worst year ever’ in data...
View ArticleSecurity Glue Between the Silos of Endpoint, Server, Cloud and Network...
Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to...
View ArticleThis Week in Security News: Botnets and Breaches
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 5,...
It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to...
View Article