Why They're Convenient, and Why They Need To Be SecuredRead more
Learn how to make your smart device ecosystem secure and safe from being compromisedRead more
Safely manage your social media accounts. Much like tidying up our homes, spring also calls for cleaning up and organizing our online accounts and devices.Read more
The recent surge of wearable "smart" devices gives us a preview of what the future is going to be like. It's not just a trend. These wearable devices are the products of the natural progression of technologyRead more
With One of the biggest sporting events in the world currently underway, we held a quick survey to find out what kind of sports fans our visitors are. Here's what we found out from the results!Read more
Starting your day just got smarter with these smart gadgets that evolved from their "not so smart" cousins. See how the Internet of Everything makes life a lot easier.Read more
New and exciting technology is on the horizon, potentially offering cybercriminals new opportunities to strike. Using them securely should be a main priority.Read more
Online console gamers will reach 165M by 2017. Before Joining the ranks, make sure you know how to protect yourself and your accounts.Read more
DOWNAD, more popularly know as CONFICKER, is one of the most elusive and notorious network worms to threaten Internet users. Despite the security industry's best efforts, DOWNAD still remains active to this dayRead more
Communication continues to evolve through technology over the years. Unfortunately, cybercriminals are keeping pace and attacking the most popular means of communication.Read more
Virtual patching complements traditional patch management strategies. It helps IT administrators 'buy time' before they install real patches and mitigate zero-day threats.Read more
Maintaining physical, virtual, and cloud platforms means facing server threats that put your data at risk. To defend your virtual servers as they move between data center and public cloud, understanding how attackers execute data breach is critical.Read more
Premium Service Abusers subscribe infected devices to premium services without your knowledge. Installing them by mistake is only the start of your worries.Read more
Even with corporate policies in place, online file storage and sharing services abound in the workplace.Read more
As threat actors move deeper into the network, their movements and methods become difficult to detect especially when they utilize tools also used by IT administrators. What does happen when APTs move laterally inside target networks?Read more
Business users have adopted the use of consumer applications in the workplace for both business and personal purposes. However, its usage may also bring security risks to company data.Read more
Despite its small size and cheap price, the Raspberry Pi is a computer that still needs securing, if the purpose it’s being used for involves connecting to the internet.Read more
Your smart TV may be interactive, Internet-ready, and loaded with apps, but are you able to maximize it?Read more
As more people engage in various online activities, threats become more prevalent and sophisticated. The basic threat protection we were used to may not be enough to protect us when these new generation risks reach us.
Blackberry 10 has several security features users and organizations can leverage.Read more
Your Android device might be missing out on updates, nifty features, and security improvements.Read more
Your online activities make you a cybercriminal target. Invest in security solutions that keep your mobile and online activities safe from cybercriminals.Read more
Constant device use can result in wear and tear. Left untreated, these issues could lead to system malfunction and data loss. Little tweaks can boost your devices' performance and keep your data safe.
Your smartphone is a bigger part of your life than you realize. Have you ever thought about what's stored in it?Read more
Mobile devices allow users to take the Internet with them wherever they go - and that includes the threats that come with it. Mobile phishing, for instance, can steal sensitive information while apps can compromise privacy.Read more
ISACA surveyed more than 1,500 infosec professionals for their 2012 Advanced Persistent Threat (APT) Awareness Study. The survey findings indicate their level of awareness, perception on being attacked, and an evaluation of their defenses against the threat.Read more
As threat actors continue to compromise target networks and extract information, enterprises need to know that these attacks can be detected using consistent network indicators, should they exert efforts to do so. Find out about these network indicators and how detecting them can help your APT defense strategy.Read more
Protecting your data and device is not as simple as just locking your phone. Make sure your information remains private by securing all possible sources of leaks.
If you can access the Internet, bad guys on the Internet can access you. With the increasing popularity of Internet-connected appliances, consider the potential security risks you open your home up to.Read more
How will Windows 8 blend with your digital life?Read more
How soon must IT groups patch vulnerable servers? The following windows of exposure timelines show the varying levels of risk enterprises face once a vulnerability is found or an exhibit is in the wild. Any delay in patching after a vendor releases a patch, therefore, is an additional window of exposure.Read more
Given the different needs and demands of a hybrid environment, enterprises should opt for a solution that enhances performance without compromising security.Read more
What happens between going online and clicking buy.Read more
Are you scared for your digital life's safety? You should. But sometimes, the things we do that undermine online security are scarier.
Threat actors target enterprises and organizations for espionage and sabotage. With sufficient research, threat actors can create a social engineering lure convincing enough to trick employees to click a link or open an attachment.Read more
Make your Oktoberfest experience one you'll never forget with these handy tips.Read more
Posting too much information in social networks could lead to undesirable consequences such as identity theft.
All eyes are on you! Everything about you can be tracked with every move you make online. Your personal data is worth a pretty penny. But it all depends on who wants it.
Attackers have been using the infamous Blackhole Exploit Kit to take advantage of existing vulnerabilities in users' systems with the end goal of compromising their security and stealing data/money in the Blackhole Exploit Kit spam campaign...Read more
From 2008 to 2012, cybercriminals have been using the world's biggest sporting event to lure unsuspecting users into their schemes.
Gaming today isn’t just about fun and games. No matter what type of gamer you are, you will always face risks.Read more
Enterprises may be exposed to threats via security holes and cracks in their virtual environments. Falling into the seeming abyss of threats can disrupt their business continuity, or worse, lead to data leakage and financial loss.Read more
Not properly managing your online credentials is like playing a game of high-stakes poker. Failing to play your cards right could very well mean game over. Take a look at some of the risks you may face when your personal information isn't as private as you hoped.Read more
As of June 2012, TrendLabs has collected over 25,000 Android malware samples. That's more than double than what we initially predicted.Read more
Advanced persistent threats are attacks against targeted companies and resources.Typically, a social engineering attack on an employee triggers a series of activities that opens up the company to serious risks.Read more
Are you a digital hoarder? Is your email or social networking account out of control? Take a peek into the clutter that can make up your digital life.Read more
Travel apps are the new must haved but overuse can be inconvenient, especially when you're on the go.Read more
Cybercriminals often exploit Facebook to infect your systems with malware. See how Trend Micro and Facebook work together to protect you from social media threats.Read more
A company's greatest asset -its employees -can also be its weakest link, especially in an era wherein mobility and accessibility play a huge role in enhancing productivity.Read more
While traditional threats are often drive by profit, most advanced persistent threats are driven by the goal of infiltrating a target network and extracting sensitive information. Luckycat is actually the latest in a string of separate APTs seen across the globe.Read more
There's more to the cybercrime underground than what you see. The total amount victims pay is distributed across a cybercriminal network in which each plays a certain role in the scam.Read more
Lets take a look at the twelve notable malware that plagued mac users in the past.Read more
Cybercriminals anticipate and respond to buzz-worthy events with scams.Read more
Do you know all of the people in your neighborhood? Think of the Internet as a huge virtual neighborhood where it's impossible to know everyone and difficult to tell the bad guys from the good guys.Read more
While some cybercriminals go for the quick payoff, others think long term. Rove Digital ran an operation that lasted more than 6 years. Let's take a look at the operation's beginning and, ultimately, downfall.Read more
One-click billing fraud guilts users into registering and paying for a certain service after being directed to a malicious site.Read more
Just as you need good habits to stay healthy offline, you also need good habits to stay healthy online.
Cybercriminals will surely set their sights on online shoppers like you this holiday season. Here are the tried-and-tested tips to shop safely.
The recent takedown of Esthost during "Operation Ghost Click" has been dubbed as the "largest cybercriminal takedown in history." Just how big is it? We compared it against recent notable takedowns based on currently available information.Read more
As holloween approaches, we at Trend Micro pooled together a list of the scare tactics that cybercriminals use. Be on the lookout fro cybercriminal tricks and threats in the days leading to the seasons of spooks.Read more
This infographic offers a look into the evolving cybercrime motivations and the resulting shifts in the threat landscape through the years.Read more
Scammers and cybercriminals take advantage of the element of trust present on social networking sites. Users' behaviors and the increasing number of social networking site features are giving the bad guys more venues in which to instigate their malicious activities.Read more
In January this year, Trend Micro chairman and co-founder Steve Chang was quoted as saying that Android-based devices are less secure than those running on iOS. While his comment caused quite a stir back then, today's threat landscape seems to agree.