- Faster Internet access means more cyberattacks for Africa
- Gurucul identifies cloud threats based on identity, behaviors
- Google, WordPress, LastPass, Salesforce - new USB token secures them all
- Attacks against industrial control systems double
- Pawn Storm cyberespionage group increases activity, targets NATO
trend micro - News, Features, and Slideshows
trend micro in pictures
Even though its activities were exposed last year, a cyberespionage group dubbed Pawn Storm has ramped up its efforts over the past few months, targeting NATO members and potentially the White House.
Sextortion rings that dupe victims into recording themselves performing sexual acts and afterward demanding ransom or they will publicly distribute the recordings are on the rise according to a report by Trend Micro.
Israeli institutions have been targeted by an Arab-speaking hacker group that sought to extract sensitive documents, according to Trend Micro.
A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.
Adobe Systems warned users that hackers are exploiting another unpatched vulnerability in Flash Player -- the third one in the past month -- to infect computers with malware.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
- Dicker Data unveils new "post-acquisition" logo (Embargo Monday April 20)
- NetApp secures $2m supercomputing deal with NCI
- Mandatory Disclosure Laws needed to counter lax security attitudes: Symantec
- Alcatel-Lucent Enterprise gears for growth following China Huaxin takeover
- Vocus buys $15 million stake in Macquarie Telecom