You’re In Safe Hands with Trend Micro Home Network Security

Credit to Author: Trend Micro| Date: Wed, 04 Dec 2019 14:05:42 +0000

A three-part series on using Home Network Security to protect your home Your home should be a haven that protects you. In the cyber age, however, your router, computers, and TVs, your game consoles and smart devices, are continuously connected to the internet and run the risk of being hacked—usually when you least expect it…

The post You’re In Safe Hands with Trend Micro Home Network Security appeared first on .

Read more

Stalking the Stalkerware

Credit to Author: Trend Micro| Date: Wed, 27 Nov 2019 20:54:33 +0000

A recently released survey interviewed black hat hackers to get a better sense of the strategies and methodologies today's cybercriminals are using.

Ever get the feeling you’re being followed? Unfortunately, when it comes to our digital lives, this is increasingly the case. But while we’re all keen to boost our followers on social media, it’s a different matter when it comes to anonymous third parties secretly stalking us online. Yes, we’re already tracked by ISPs every time…

The post Stalking the Stalkerware appeared first on .

Read more

Warning! Windows 10 Fake Update is Actually Ransomware

Credit to Author: Trend Micro| Date: Thu, 21 Nov 2019 16:27:31 +0000

Mobile devices could be the biggest ransomware threat.

Microsoft never sends updates via email. Many folks don’t know that, which is why a new ransomware campaign masquerading as a Windows 10 update is so pernicious. You may have already gotten a fake notice saying “Install Latest Microsoft Update Now!” Or “Critical Microsoft Windows Update!”, with the body of the message asking you to…

The post Warning! Windows 10 Fake Update is Actually Ransomware appeared first on .

Read more

Online Phishing: How to Stay Out of the Hackers’ Nets

Credit to Author: Trend Micro| Date: Wed, 20 Nov 2019 14:05:56 +0000

Phishing scams and social engineering continue to cause problems for social media users.

Despite the growing popularity of social media and messaging apps, email remains the preferred way to communicate online for millions of Americans. And the bad guys know it. Of the 28.6 billion cyber-threats Trend Micro blocked globally in the first half of 2019, over 24.3 billion were carried by email. That’s 91%. Many of these…

The post Online Phishing: How to Stay Out of the Hackers’ Nets appeared first on .

Read more

BlueKeep Attacks seen in the wild!

Credit to Author: Sameer Patil| Date: Fri, 08 Nov 2019 09:54:04 +0000

CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way as the WannaCry malware spread across the globe in 2017. Interestingly,…

Read more

Apple removes app that tracks Hong Kong police and protestors

Credit to Author: Danny Bradbury| Date: Fri, 11 Oct 2019 10:54:03 +0000

Apple was under fire this week after banning an app that tracked the location of both police and protesters in Hong Kong on a live map.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/NGy6SSRh_9k” height=”1″ width=”1″ alt=””/>

Read more

Decrypting What Zero Trust Is, And What It Likely Isn’t

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Fri, 04 Oct 2019 17:33:56 +0000

https://blog.trendmicro.com/answers-to-your-questions-on-our-mac-apps-store/

It’s always an indicator of confusion when instead of hearing “I want Q” I’m asked “what is Q?”. In this case the ‘Q’ is Zero Trust.  I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…

The post Decrypting What Zero Trust Is, And What It Likely Isn’t appeared first on .

Read more