TrendMicro

SecurityTrendMicro

This Week in Security News: Amazon Echo Hacked at Pwn2Own Tokyo 2019 and Ransomware Attacks Hit Spanish Companies

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 08 Nov 2019 14:05:54 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a ransomware that is attacking Spanish companies and how nearly 50 adware apps were found on Google Play. Also, read about how an Amazon Echo…

The post This Week in Security News: Amazon Echo Hacked at Pwn2Own Tokyo 2019 and Ransomware Attacks Hit Spanish Companies appeared first on .

Read More
SecurityTrendMicro

Trend Micro Discloses Insider Threat Impacting some of its Consumer Customers

Credit to Author: Trend Micro| Date: Tue, 05 Nov 2019 15:45:47 +0000

We recently became aware of a security incident that resulted in the unauthorized disclosure of some personal data of an isolated number of customers of our consumer product.  We immediately started investigating the situation and found that this was the result of a malicious insider threat. The suspect was a Trend Micro employee who improperly accessed the data with a clear criminal intent.   We immediately began taking the actions necessary to…

The post Trend Micro Discloses Insider Threat Impacting some of its Consumer Customers appeared first on .

Read More
SecurityTrendMicro

Tips to Accelerating PCI Data Security Standard Projects with Deep Security as a Service

Credit to Author: Trend Micro| Date: Mon, 04 Nov 2019 18:22:20 +0000

Does your organization need to meet PCI DSS requirements? Are you struggling with multiple security tools? Or stretching your already overstretched team to prepare for an audit? Time to hit the accelerator with Trend Micro! If your applications deal with credit or payment card data, you need to go through a long and cumbersome certification…

The post Tips to Accelerating PCI Data Security Standard Projects with Deep Security as a Service appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Pwn2Own Adds Industrial Control Systems to Hacking Contest and Cyber Crooks Target ESports

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Nov 2019 13:05:25 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Among news from this week, learn about Pwn2Own’s new hacking contest that will take place in Miami next year. Also, as October was Cybersecurity Awareness Month, read about best…

The post This Week in Security News: Pwn2Own Adds Industrial Control Systems to Hacking Contest and Cyber Crooks Target ESports appeared first on .

Read More
SecurityTrendMicro

Home and Away, All Year Round: How Can I Keep My Kids Safe Online?

Credit to Author: Muriel Mathis| Date: Mon, 28 Oct 2019 13:03:30 +0000

We’re well into another school year in the US and elsewhere. For many parents and their kids, this can be a stressful time — demanding new routines, more study and longer days. But how many of us think about the potential extra cyber risks to our family that might also emerge during this time? The…

The post Home and Away, All Year Round: How Can I Keep My Kids Safe Online? appeared first on .

Read More
SecurityTrendMicro

3 Ways for MSPs to Increase Their Managed Security Footprint

Credit to Author: Trend Micro| Date: Fri, 25 Oct 2019 18:05:35 +0000

Managed service providers looking to increase their business often face the choice of whether to focus on finding new customers or expanding their existing base. But there’s a growing opportunity making the latter option especially appealing. The small and midsize businesses that comprise the bulk of the MSP customer base have a limited understanding of…

The post 3 Ways for MSPs to Increase Their Managed Security Footprint appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Oct 2019 13:03:43 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s recent acquisition of Cloud Conformity. Also, read about a fake photo editing app on Google Play and the 17 malicious iOS apps removed…

The post This Week in Security News: Trend Micro Acquires Cloud Conformity and Apple Removes Malicious iOS Apps from App Store appeared first on .

Read More
SecurityTrendMicro

A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development

Credit to Author: Bharat Mistry| Date: Thu, 24 Oct 2019 16:35:26 +0000

Most organisations see supply chains as providers of physical goods and services. The supply chain management function in these companies usually provides the governance framework to reduce third-party risks and prevent hackers from stealing data, disrupting daily operations and affecting business continuity. But there’s another crucial part of this ecosystem which some organisations may be…

The post A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development appeared first on .

Read More