Current News

SecurityTrendMicro

Evaluating The Risk Of DoubleAgent

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 24 Mar 2017 20:35:43 +0000

Security startup Cybellum recently announced a new attack that they’re calling “DoubleAgent”. They’ve labelled this a zero day “attack for taking full control over major antiviruses and next-generation antiviruses”. There’s a lot to unpack here. When you’re assessing the risk any issue poses it’s always best to clearly define the issue. Let’s start there. The…

Read More
SecurityTrendMicro

The S In HTTPS

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 23 Mar 2017 12:00:37 +0000

If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. The S in HTTPS. SSL/TLS (just to keep it simple, I’ll refer to as SSL) is the technology used to encrypt the communication between your browser and…

Read More
SecurityTrendMicro

Hackers Attempt To Extort Apple

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 22 Mar 2017 13:42:55 +0000

Briefcase full of moneyCybercrime is a business. Professional criminals refine their processes, measure performance, and regularly evaluate the return on their investments. Every move is strategic. We see this time and time again with ransomware campaigns and throughout the underground. Which is why the latest report from Joseph Cox at Motherboard is mind boggling. Joseph brings us the…

Read More
SecurityTrendMicro

SHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 24 Feb 2017 20:52:12 +0000

The SHA-1 hash function is broken. This isn’t news. What is news is that a practical attack has been demonstrated  Keep in mind that “practical” is used in cryptographers terms and those terms don’t necessarily have an impact on your daily IT use. The news has been making the rounds as IT teams, journalists, and…

Read More