AUGUST 1, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Cybercriminals Prove Two-Factor Authentication Can Be as Holey as Emmental

Security for Home Users
The Dawn of the Internet of Everything: Smart Meters

Security for Business
What Real Targeted Attacks Are Like

Security Spotlight

Cybercriminals Prove Two-Factor Authentication Can Be as Holey as Emmental

Two-factor authentication is one of the most widely used online banking and e-commerce security measures. Users can only access their online accounts by providing two passwords—their online account passwords and an access code sent to their nominated authentication device, usually a smartphone.


Read on >>

Security for Home Users

The Dawn of the Internet of Everything: Smart Meters

The Internet of Everything (IoE) or the Internet of Things (IoT) is one of the latest technology trends, as vendors release all manners of “smart” appliances and devices. While still obviously in its infancy, as homes have yet to become fully automated and roads yet to be filled with driverless cars, IoE is rapidly gaining traction in utilities management in more advanced countries.


Read on >>

Security for Business

What Real Targeted Attacks Are Like

We work with IT administrators worldwide because we are a security company and that’s part of our job. In such collaborations, we discovered some common misconceptions about targeted attacks. While well-meaning and optimistic, we believe that these misconceptions could prove harmful to organizations if allowed to persist. To avoid further confusion, learn a few truths about targeted attacks.


Read on >>

We appreciate your interest in the Trend Micro First Line of Defense Newsletter. If you would like to receive future copies of this newsletter, please OPT IN to our mailing list.

Trend Micro guards your privacy. Read our PRIVACY POLICY.

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com Click here to unsubscribe.