- Four charged with stealing Army helicopter training software
- Survey shows the cost of security breaches are on the rise
- Cisco, Oracle find dozens of their products affected by Shellshock
- Need help? Microsoft Stores offer free tech support, PC tune-ups, malware removal
- Likes of Apple Pay may make smaller banks more vulnerable
trend micro - News, Features, and Slideshows
trend micro in pictures
Medibank is allowing staff outside of the IT department to sign up to cloud services such as Amazon Web Services (AWS) to reduce website hosting costs, while at the same time including IT security in the process, according to Medibank enterprise security manager Mark Burns.
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
As a safety precaution to prevent SSL server certificates being exploited for network man-in-the-middle attacks on organizations, vendors that issue SSL server certificates will begin adhering to new issuance guidelines as of Nov. 1. These new rules, as described by members of the industry group Certificate Authority/Browser Forum, mean certificate authorities (CAs) will not issue certificates that contain "internal names" and expire after Nov. 1, 2015.
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
Consumers in Australia and around the world have fallen for a social engineering link promising a free download of Transformers 4, 22 Jump Street or Maleficent.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
- Local Council ditches multiple vendors for TechnologyOne
- Brennan IT readies $30 million for acquisitions
- Lenovo to pump $5m into A/NZ as part of its IBM x86 server purchase
- Krux appoints data science expert to boost APAC team
- Google Capital leads investment charge in Cloud optical transceiver company