trend micro - News, Features, and Slideshows
trend micro in pictures
Medibank is allowing staff outside of the IT department to sign up to cloud services such as Amazon Web Services (AWS) to reduce website hosting costs, while at the same time including IT security in the process, according to Medibank enterprise security manager Mark Burns.
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
As a safety precaution to prevent SSL server certificates being exploited for network man-in-the-middle attacks on organizations, vendors that issue SSL server certificates will begin adhering to new issuance guidelines as of Nov. 1. These new rules, as described by members of the industry group Certificate Authority/Browser Forum, mean certificate authorities (CAs) will not issue certificates that contain "internal names" and expire after Nov. 1, 2015.
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
BlackBerry has always touted its mobile devices as secure. But now it plans to make them "more secure" by acquiring a German company that specializes in voice encryption.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
- Latest Firefox version adds protection against rogue SSL certificates
- One more time: Use two-factor authentication on iCloud, even if there's a waiting period
- US Home Depot breach could potentially be as big as Target's
- Home Depot investigates possible payment data breach
- "Outraged" Apple issues update on celebrity cellphone nude photo breach
- Rocket Fuel latest programmatic ad tech vendor to come to Australia
- Video advertising dominates latest IAB online expenditure report
- Apple partners with Mastercard and Visa on mobile wallet
- Skills and silos still inhibiting leading Aussie brands from being modern marketers
- Deloitte describes four-step model for customer-led marketing