trend micro - News, Features, and Slideshows
trend micro in pictures
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
By Jeremy Kirk | 26 August, 2014 16:25
As a safety precaution to prevent SSL server certificates being exploited for network man-in-the-middle attacks on organizations, vendors that issue SSL server certificates will begin adhering to new issuance guidelines as of Nov. 1. These new rules, as described by members of the industry group Certificate Authority/Browser Forum, mean certificate authorities (CAs) will not issue certificates that contain "internal names" and expire after Nov. 1, 2015.
By Ellen Messmer | 16 August, 2014 01:56
A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.
By Lucian Constantin | 05 August, 2014 01:47
BlackBerry has always touted its mobile devices as secure. But now it plans to make them "more secure" by acquiring a German company that specializes in voice encryption.
By John Cox | 30 July, 2014 05:23
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
By Ellen Messmer | 15 February, 2013 23:19
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that Android phones are more vulnerable to hacking than iPhones are. If it didn't, those blatantly self-serving statements were made for nothing.
By Katherine Noyes | 14 January, 2011 11:04
It's become an all-too-common scam: A legitimate Web site pops up a window that looks just like a real security warning. It says there's something wrong with the computer, and click here to fix it. A few clicks later, the victim is paying out US$40 for some bogus software, called rogue antivirus.
By Robert McMillan | 26 October, 2009 08:28
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
These days IT teams must support a multiplicity of devices, operating systems and work habits. This paper helps readers learn how best to simplify administration and secure vital data. • To capitalize on mobility, enterprises need to provide employees with access to corporate data and applications anytime, anywhere • Organizations need to expand access to corporate networks without exposing the organization to threats • Organizations must have the flexibility to accommodate a wide range of variables today and lay the groundwork for future developments
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- iPhone 6 review roundup -- the raves come quietly
- Alibaba shares open at a high $92.70
- New organization sets out to make secure communication tools more user-friendly
- Tim Cook launches iPhone 6 sales in Palo Alto
- HP leapfrogs Red Hat to become top contributor to OpenStack
- New iPhone 6 and 6 Plus are easier to repair
- Shut out on iPhone 6 Plus, buyers settle for smaller version
- Screen size matters to Apple fans in line for the iPhone 6
- Half-baked mergers
- Ping Identity picks up $35 million more in venture funding
- Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue
- Watch video of the first iPhone 6...being dropped