TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 4, 2017
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 08 Dec 2017 14:45:44 +0000
It snowed in Austin, Texas last night. It’s not a big deal for those of you who live in areas where you’re used to snow, but for those of us who are native Texans, it’s a big deal. Funny enough, I had scheduled a maintenance appointment for later today to make sure our heater is…
Security Bugs – “The Root of all Evil” by Paul Ionescu, Security Architect Looking back at some of the famous security breaches of 2017 we find that they have been caused by software bugs. The WannaCry attack which impacted computers in 150 countries for an estimated cost of $4 billion used a memory flaw in…
Tips to utilizing app permissions in the world’s most popular mobile operating system. – by Ian Grutze, Senior Global Product Manager Mobile devices are amazing tools that can enrich your life in many ways. Need to solve a problem…? There’s probably an app for that. As these devices mature, and as we weave them into our daily…
For 15 consecutive years, Trend Micro has received the Best Global Taiwan Brands and named as second most valuable this year. The award is organized by the Industrial Development Bureau of Taiwan’s Ministry of Economic Affairs and Intrabrand, a global consultancy. Through continuous efforts to provide advanced technology and services in cyber security solutions, Trend…
I have two people I visit often: My college friend lives near Poughkeepsie, NY; my girlfriend is in central New Jersey. Getting to Poughkeepsie is simple – there is one major route from my place in Connecticut, with two variations covering the last few miles. Trips to New Jersey can follow multiple routes, bridging the…
Trend Micro just released its annual predictions report for next year. In this, we outline 8 ways the threat landscape is expected to evolve in 2018. While the predictions touch on a wide range of issues – from IoT to cyberpropaganda – the underlying theme is this, 2018’s biggest attacks will stem from known vulnerabilities….
Attackers are continually redirecting their efforts from the desktop to the mobile endpoint, and as a result, threats to the mobile platform are currently on the rise.