trend micro - News, Features, and Slideshows
trend micro in pictures
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
By Jeremy Kirk | 11 February, 2016 10:00
Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
By Jeremy Kirk | 03 February, 2016 09:51
There hasn't been a lack of strange things turning up in the Ashley Madison data leak. One of the latest discoveries comes from Trend Micro, which found bogus Ashley Madison profiles that used email addresses the company created solely for collecting spam samples.
By Jeremy Kirk | 09 September, 2015 06:34
A closely watched band of suspected Russian hackers have spied on domestic targets, including two members of the outspoken punk rock band Pussy Riot.
By Jeremy Kirk | 19 August, 2015 06:29
A malicious application or Web page could be used to crash Android devices, in some cases persistently, due to a vulnerability in a multimedia processing component.
By Lucian Constantin | 30 July, 2015 00:41
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
By Ellen Messmer | 15 February, 2013 23:19
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
By Katherine Noyes | 14 January, 2011 11:04
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
By Robert McMillan | 26 October, 2009 08:28
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCVMWare Horizon View 6.1 roll out & IT support | Short contract | Macquarie ParkNSW
- CCSharePoint DeveloperACT
- CCService Desk ManagerVIC
- CCData Stage DeveloperNSW
- FTSenior .NET DeveloperVIC
- FTAndroid DeveloperNSW
- CCContract Programmer (Crystal Reports/JAVA/SQL) 160129/P/vhs-cAsia
- CCHybris Developer - Global ConsultancyNSW
- CCSystem TesterQLD
- CCEXCEL Guru / Data AdministratorNSW
- CCInformation Security ManagerNSW
- CCSAP CRM Specialist- ABAPACT
- CCFusion Middleware DeveloperACT
- FTApplications Architect/ Pre-sales (Microsoft Applications)WA
- FTSystems Administrator/Engineer | $60-90K package | ChatswoodNSW
- CCEnterprise ArchitectNSW
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCSecurity Consultant/Analyst (Data Loss Prevention)WA
- FTVB6 DeveloperNSW
- CCContract System Engineer (Lotus Domin) 160129/SE/vccAsia
- FTClient Services Manager - Programmatic AdvertisingNSW
- CCSharepoint AdministratorVIC
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- FTProject Manager | SharePoint, Office 365 SkillsVIC
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- GitHub apologizes for ignoring community concerns
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Five sue Apple over Error 53 and bricked iPhones
- AT&T to run field trials of 5G wireless in Austin this year
- Apple's iPhone sued for infringement of touch feedback patents
- Need data-science skills? Now your team can learn together
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too