TrendMicro

SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 20, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 24 Mar 2017 13:33:43 +0000

The 10th anniversary of Pwn2Own is now in the books! It was a crazy week at the CanSecWest Conference, full of drama with the biggest contest ever with teams from Asia, Europe and North America! It was a tight race with only three points separating first and second place. In the end, we saw a…

Read More
SecurityTrendMicro

Pwn2Own 2017 – An Event for the Ages

Credit to Author: Brian Gorenc| Date: Thu, 23 Mar 2017 16:00:29 +0000

The 10th anniversary of Pwn2Own just successfully completed as the Zero Day Initiative spent $833,000 acquiring 51 different 0-day bugs. The event was filled with drama as vendors released their security patches the day before the contest, causing a number of entries to pull out immediately. Over the next three days, five additional entries would…

Read More
SecurityTrendMicro

2016 Review of Vulnerabilities

Credit to Author: Jon Clay| Date: Thu, 23 Mar 2017 13:00:45 +0000

In our 2016 security roundup report, A Record Year for Enterprise Threats, we talked about the vulnerability landscape during the year and what trends we saw. Let’s look at some of the key aspects of what we saw in 2016. 1. Trend Micro’s Zero Day Initiative (ZDI) with support of their 3,000+ independent vulnerability researchers,…

Read More
SecurityTrendMicro

The S In HTTPS

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 23 Mar 2017 12:00:37 +0000

If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. The S in HTTPS. SSL/TLS (just to keep it simple, I’ll refer to as SSL) is the technology used to encrypt the communication between your browser and…

Read More
SecurityTrendMicro

Hackers Attempt To Extort Apple

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 22 Mar 2017 13:42:55 +0000

Briefcase full of moneyCybercrime is a business. Professional criminals refine their processes, measure performance, and regularly evaluate the return on their investments. Every move is strategic. We see this time and time again with ransomware campaigns and throughout the underground. Which is why the latest report from Joseph Cox at Motherboard is mind boggling. Joseph brings us the…

Read More