This Week in Security News: Meltdowns and Hijacks
Credit to Author: Jon Clay| Date: Fri, 12 Jan 2018 14:00:41 +0000
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, we saw discussions on the vulnerabilities of chat bots and AI programs, and the types of software that may not be safe from malware and hackers. Read…
Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach. IoT 0.9 The primitive group contains all legacy Operational Technology (OT) and Industrial Control Systems (ICS) that use some form…
Last year, Trend Micro launched our popular Deep Security as a Service offering on the AWS Marketplace, combining industry-leading threat protection for cloud workloads, effortless deployment, and the added bonus of a unified Amazon Web Services (AWS) bill. This has been a successful model for customers wanting to purchase workload protection directly, however the reality…
The holiday season is traditionally a time for friends and family, gift-giving and celebrations. But it’s also a time to remember those less fortunate than ourselves, and to do what we can to make their lives better. As a responsible corporate citizen, Trend Micro is always keen to find new ways to give back to…
Happy New Year! It’s out with the old, in with the new, right? Except we all know that the old tends to stick around, especially when it comes to vulnerabilities and patching them. Trend Micro predicts that that 2018’s biggest attacks will originate from known vulnerabilities. And speaking of known vulnerabilities, the Zero Day Initiative…
Two days ago, Graz University of Technology published a paper https://spectreattack.com/ describing a pair of attacks on common microprocessors. The underlying vulnerability affects Intel, AMD, and ARM processors. All contemporary microprocessors pre-execute instructions. In other words, the vulnerability bypasses address space isolation. Address space isolation has been a foundation for processor integrity since the 1980s….
In the never-ending race for profits, shareholder value and customer wins, organizations can sometimes forget about their employees. Yet in reality, your workers are your number one asset: if they feel undervalued or disrespected it can rip the heart and soul out of the organization, setting off a chain reaction from which it can be…