TrendMicro

SecurityTrendMicro

The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide

Credit to Author: Trend Micro| Date: Tue, 30 Apr 2019 13:00:51 +0000

Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro When it comes to software container security, it’s important for enterprises to look at the big picture, taking into account how they see containers effecting their larger security requirements and future DevOps needs. Good practices can help security teams build a strategy that…

The post The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Phishing Attacks and Ransomware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Apr 2019 12:00:16 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about schemes used in phishing and other email-based attacks. Also, learn how ransomware continues to make a significant impact in the threat landscape. Read on: New…

The post This Week in Security News: Phishing Attacks and Ransomware appeared first on .

Read More
SecurityTrendMicro

Dallas Start-Ups (submission extended): Pitch Us Your Ideas for a Smarter Connected World

Credit to Author: Trend Micro| Date: Mon, 08 Apr 2019 13:00:40 +0000

updated April 22, 2019 At Trend Micro we’ve spent the past three decades successfully solving problems for our customers. It’s helped us to become a leading provider of services to secure the connected world. But we’re not done there. We also want to find and learn from the technology innovators and problem-solvers of tomorrow. That’s…

The post Dallas Start-Ups (submission extended): Pitch Us Your Ideas for a Smarter Connected World appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Medical Malware and Monitor Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 18 Apr 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how baby monitors may be susceptible to hacking. Also, learn about a medical flaw that enables hackers to hide malware. Read on: Is Your Baby Monitor…

The post This Week in Security News: Medical Malware and Monitor Hacks appeared first on .

Read More
SecurityTrendMicro

What Did We Learn from the Global GPS Collapse?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 17 Apr 2019 13:00:24 +0000

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS. Now, more systems rely on accurate time and position data:…

The post What Did We Learn from the Global GPS Collapse? appeared first on .

Read More
SecurityTrendMicro

Is Your Baby Monitor Susceptible to Hacking?

Credit to Author: Trend Micro| Date: Wed, 17 Apr 2019 12:00:19 +0000

There’s no doubt that digital technology, in many of its forms, brings everyday tasks much closer-to-hand. From discovering breaking news, to online shopping, to keeping tabs on your home via security cameras—everything is within the touch of a button. Even so, with the growing reach of the Internet of Things (IoT), new and unsuspected threats…

The post Is Your Baby Monitor Susceptible to Hacking? appeared first on .

Read More
SecurityTrendMicro

Continuing Education On Cyber Threats And Defenses

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 16 Apr 2019 13:00:05 +0000

Anyone who has been in cybersecurity for any length of time knows, the threat landscape is constantly changing and requires regularly monitoring of news, blogs, podcasts, and other ways to ensure you know what is happening today. I have tried to bring this information to the public since starting my monthly threat webinar series in…

The post Continuing Education On Cyber Threats And Defenses appeared first on .

Read More
SecurityTrendMicro

Google Play and Microsoft Stores Delete Suspected Compromised Apps

Credit to Author: Trend Micro| Date: Mon, 15 Apr 2019 12:00:24 +0000

Recently, Google Play Store and Microsoft Store both deleted multiple applications from their online stores, because the apps were malicious. Google deleted a total of 29 beauty camera apps from its Play Store, most of which show users pornographic contents or send them to phishing websites. The malicious beauty camera apps, discovered by Trend Micro, looked legitimate, but…

The post Google Play and Microsoft Stores Delete Suspected Compromised Apps appeared first on .

Read More