News

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro at MWC: Securing Our Mobile, Connected World

March 01, 2018

Time flies pretty fast in tech. When Trend Micro was founded nearly 30 years ago, mobile phones were pretty clunky, prohibitively expensive and not in the least bit “smart.”

Windows® Mac® AndroidTM iOS new Power Up

OMG Mirai Variant Turns IoT Devices Into Proxy Servers

February 28, 2018

A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers.

Windows® Mac® AndroidTM iOS new Power Up

Vulnerabilities can Let Hackers Hijack Tinder Accounts with Just a Phone Number

February 27, 2018

Security researcher Anand Prakash uncovered vulnerabilities in Tinder and the way it uses Facebook’s Account Kit.

Windows® Mac® AndroidTM iOS new Power Up

A Look Into the Most Noteworthy Home Network Security Threats of 2017

February 27, 2018

Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users’ information and security.

Windows® Mac® AndroidTM iOS new Power Up

2017 Mobile Threat Landscape

February 26, 2018

We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.

Windows® Mac® AndroidTM iOS new Power Up

Security 101: Digital Extortion in 2018

February 13, 2018

Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money

Windows® Mac® AndroidTM iOS new Power Up

Scammers Now Taking to Social Media to Steal Bitcoins

February 08, 2018

Scammers have found ways to give the rather dated Nigerian Prince scam a new twist: Abuse social media to steal cryptocurrency such as ethereum or bitcoin.

Windows® Mac® AndroidTM iOS new Power Up

OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate

February 06, 2018

Cryptocurrency-mining malware entered the macOS scene in 2011 as a bitcoin-mining backdoor embedded in applications distributed via torrents.

Windows® Mac® AndroidTM iOS new Power Up

Data Privacy in the Age of IoT

February 01, 2018

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits.

Page 7 of 11   << ... 5 6 7 8 9 ... >>