TrendMicro

SecurityTrendMicro

This Week in Security News: How a GIF Can Hack Your Android and Vulnerabilities That Could Put Hospital Networks at Risk

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 Oct 2019 13:05:54 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how smart home devices can be easily hacked and 11 vulnerabilities that could affect medical devices and hospital networks. Also, read about why AI could…

The post This Week in Security News: How a GIF Can Hack Your Android and Vulnerabilities That Could Put Hospital Networks at Risk appeared first on .

Read More
SecurityTrendMicro

In Identity Theft the Target is You!

Credit to Author: Trend Micro| Date: Wed, 02 Oct 2019 13:52:23 +0000

The hard truth is that identity data is the new gold—and criminal panhandlers are mining it for sale and distribution on the Dark Web. Indeed, the internet provides ways for big data breaches to result in disastrous leaks of huge databases of personal information, resulting in detailed profiles of individuals—based on their internet behaviors, including…

The post In Identity Theft the Target is You! appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Fake Apps on iOS and Google Play and Social Media Security Issues

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 27 Sep 2019 13:05:27 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the evolution of EDR to XDR (and why your CISO should care), stock trading app attacks and fake gambling apps. Also, read about how Instagram…

The post This Week in Security News: Fake Apps on iOS and Google Play and Social Media Security Issues appeared first on .

Read More
SecurityTrendMicro

Why Should CISOs Care About XDR?

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 20 Sep 2019 14:40:18 +0000

We have been collectively saying in our industry for the last 15-20 years that a layered approach to your security stack is a “best practice,” but as with all best practices, these are ideals rather than reality for so many charged with protecting their organizations. The vast majority of CISOs are saddled with legacy operating…

The post Why Should CISOs Care About XDR? appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Magecart Attacks and Is Your Smart TV Spying on You?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 20 Sep 2019 13:05:20 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Magecart attacks and the security implications of PSD2. Also, read about how your smart TV might be leaking your data to the likes of Facebook,…

The post This Week in Security News: Magecart Attacks and Is Your Smart TV Spying on You? appeared first on .

Read More
SecurityTrendMicro

Beyond The Standard CISO Cloud Security Guide

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 19 Sep 2019 13:53:11 +0000

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…

The post Beyond The Standard CISO Cloud Security Guide appeared first on .

Read More
SecurityTrendMicro

There She Breaches! Watch Out For Your Identity Data!

Credit to Author: Trend Micro| Date: Wed, 18 Sep 2019 13:06:03 +0000

Data breaches keep on coming. Here’s what you can do to stay ahead of the hackers Money makes the world go around. It’s the glue that holds our society together and the engine that drives our economy. But it’s also coveted by a growing global population of highly resourceful and determined cyber-criminals. They’re out to…

The post There She Breaches! Watch Out For Your Identity Data! appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: IoT Devices Are a Target in Cybercriminal Underground

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Sep 2019 13:18:33 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how fileless malware abuses PowerShell. Also, read how Trend Micro researchers are pulling back the curtain on the cybercriminal underground to warn consumers and businesses about…

The post This Week in Security News: IoT Devices Are a Target in Cybercriminal Underground appeared first on .

Read More