trend micro - News, Features, and Slideshows
trend micro in pictures
Attacks that exploit the Shellshock vulnerabilities recently patched in the Bash Unix deliver a malware program that tries to compromise systems running BusyBox, a collection of Unix utilities typically used on embedded devices like routers.
By Lucian Constantin | 18 November, 2014 01:12
Adobe Systems released critical security updates Tuesday for Flash Player to address 18 vulnerabilities, many of which can be remotely exploited to compromise underlying systems.
By Lucian Constantin | 12 November, 2014 22:20
A recent piece of malware that aims to steal your online banking credentials revives a decade-old technique to install itself on your PC.
By Jeremy Kirk | 06 November, 2014 12:46
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
By Lucian Constantin | 24 October, 2014 21:03
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
By Ellen Messmer | 15 February, 2013 23:19
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
By Katherine Noyes | 14 January, 2011 11:04
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
By Robert McMillan | 26 October, 2009 08:28
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
- Startup SQLdep aims to help DBAs stay sane
- BlackBerry's deal to buy voice crypto company Secusmart blessed by German government
- Apple's Black Friday sale includes iPhone for the first time
- France, Germany want EU to take a tougher stance on tech firms
- Coming soon: Murder by Internet
- Distracted? Slap this Hitachi gizmo on your forehead to focus
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
- Sony confirms development of e-paper smartwatch
- Sydney Startup Weekend doubles attendance in one year
- ASIC unhappy with exclusion from data retention regime
- Australian Internet Security Initiative portal launched to help ISPs
- How SBS scaled up for FIFA World Cup online
- Hail pounds telecom networks in Queensland
- RMIT University builds virtual networking labs for students
- Weather.com fixes web application vulnerabilities