Data Breach

Data Breach: A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Read more
A surveillance software company gets breached, exposing files that include an exploit for a zero-day. Several exploit kits have been updated to include the exploit that affects all versions of Adobe Flash player.
Personal information of the users of online adult dating site AdultFriendFinder have reportedly been leaked, with intimate details that open them up to extortion.
  • Passwords: Not Going Away Anytime Soon

    While it’s true that passwords are not the most convenient way of authenticating yourself and they are inherently insecure, we should not be so quick to dismiss them. Here's why.
  • Fingerprint Scans, Passwords, and Managing Online Accounts

    How new mobile technology, such as the Touch ID sensor on the iPhone 5S, is addressing the "password problem"
  • The Trouble With Passwords

    Password security has always been about balancing what people can remember and what’s difficult for attackers to guess. Today's computing environment is making it harder to balance.
  • Password (In)security, Revisited

    These latest data breach incidents teach us that people are still using woefully insecure passwords. Here are a few tips on how to improve your password security.
Trend Micro CTO Raimund Genes shares his insights on how companies and law enforcement agencies should act together to prevent more data breach incidents from happening in the future.
Securing an organization's network takes more than just technology. While employees are still a company's biggest asset, they can also become the weakest link in terms of security.
    A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper.
    This research paper discusses how PoS RAM scrapers infect systems and exfiltrate stolen data, and provides a list of strategies and techologies that can be used to defend against the threat.
    PoS malware has evolved rapidly over the past few years, targeting mostly big retail companies from which they could obtain large chunks of data. See how PoS systems—and how the malware that targets them—works, and how to defend against them.

    Connect with us on