Trend Micro
Take it to the boardroom: Elevating the cybersecurity discussion
As data breaches continue to rise, organizations, regardless of their size or industry they are in, must take into consideration a new mindset. Despite the FBI’s focus on …
Petya ransomware encrypts files, disks, locks users out of computers
A new type of ransomware does not only encrypt the victims’ files, but also their disk’s Master File Table (MFT), and it replaces the boot drive’s existing …
5 key questions to determine your security posture
To understand any businesses’ security posture, one must first understand the eight categories of cybersecurity that is impacted: security intelligence, fraud, people, …
Android adware infiltrates devices’ firmware, Trend Micro apps
Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …
Sophisticated threats dictate future response strategies
Trend Micro released its annual security roundup report which dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, …
Trend Micro Cloud App Security integrates with Box, Dropbox and Google Drive
Trend Micro announced the expansion of its Cloud App Security at the RSA Conference. Cloud App Security enhances cloud file sharing and collaboration services and Microsoft …
Google researchers finds critical flaws in Trend Micro AV solution
If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …
Featured news
Sponsored
Don't miss
- How to make Infrastructure as Code secure by default
- Suspect arrested over the Transport for London cyberattack
- Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869)
- Losses due to cryptocurrency and BEC scams are soaring
- Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense