• December 09, 2013
    Trend Micro Chief Technology Officer Raimund Genes talks about his predictions for 2014 and beyond. IoE-enabled device users are expected to ward off an increased number of threats while more breaches and law enforcement challenges are expected to rise.
  • December 02, 2013
    Pricing is an issue when it comes to the adoption of the Internet of Things among consumers. However, even as almost half of them perceive smart devices as luxury items, the trend is expected to gain momentum as technology advances.
  • November 19, 2013
    Why would something as ordinary as a new kind of top-level domain (TLD) name interest anybody today? Is the level of attention it may receive, especially from security industry observers, even warranted? In the case of .bit, we believe it is.
  • November 08, 2013
    Silk Road 2.0 launched while Ross Ulbricht, the accused operator of the first Silk Road Marketplace, remains in trial in New York. Silk Road 2.0 offers more secure options.
  • October 15, 2013
    Trend Micro researchers have discovered that flaws in the AIS vessel tracking system can allow attackers to hijack communications of existing vessels, create fake vessels, trigger false SOS or collision alerts and disable AIS tracking on any vessel.
  • October 13, 2013
    Researcher Marco Balduzzi talks about the Internet of Everything and how he and other engineers were able to hijack existing vessels during the Hack in the Box conference.
  • September 17, 2013
    How new mobile technology, such as the Touch ID sensor on the iPhone 5S, is addressing the "password problem"
  • August 27, 2013
    The Internet of Everything is the most recent among the three waves of innovation made possible by the Internet. Seeing how threats developed and evolved during the mobile and cloud waves, should IoE users expect the same amount and rate of threat growth?
  • August 08, 2013
    The annual gathering of the security community in Las Vegas brought about issues of conventional and unconventional threats. These include the implications of new connected IoE devices, digital privacy issues, and unsecured systems.