Top IT Security Bloggers

TrendLabs - Malware Blog
  • Finding Holes in Banking Security: Operation Emmental

    TrendLabs - Malware Blog
    Like Swiss Emmental cheese, the ways your online banking accounts are protected might be full of holes. Banks have been trying to prevent crooks from accessing your online accounts for ages. Passwords, PINs, coordinate cards, TANs, session tokens – all of these were created to help prevent banking fraud. We recently come across a criminal […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFinding Holes in Banking Security: Operation Emmental
  • Smart Meter Attack Scenarios

    TrendLabs - Malware Blog
    In our previous post, we looked at how smart meters were being introduced across multiple countries and regions, and why these devices pose security risks to their users. At their heart, a smart meter is simply… a computer. Let’s look at our existing computers – whether they are PCs, smartphones, tablets, or embedded devices. Similarly, these […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSmart Meter Attack Scenarios
  • Cybercriminals Hitchhike on the News of MH17 Crash

    TrendLabs - Malware Blog
    A few months after the case of the missing Malaysian Airlines Flight 370, the world was shocked again with another tragic news involving the crash of Malaysian Airlines 777 (also known as MH17) over Ukraine that killed nearly 300 passengers and crew members. As with past incidents, cybercriminals are quick to take advantage of the said […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCybercriminals Hitchhike on the News of MH17 Crash
  • Mitigating UAF Exploits with Delay Free for Internet Explorer

    TrendLabs - Malware Blog
    After introducing the “isolated heap” in June security patch for Internet Explorer, Microsoft has once again introduced several improvements in the July patch for Internet Explorer. The most interesting and smart improvement is one which we will call “delay free.” This improvement is designed to mitigate Use After Free (UAF) vulnerability exploits by making sure Internet […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMitigating UAF Exploits with Delay Free for Internet Explorer
  • Dealing With Open Wi-Fi and Public Hotspots

    TrendLabs - Malware Blog
    The topic of open Wi-Fi and public hotspots has been in the news again, for several reasons. Last month, the Electronic Frontier Foundation launched OpenWireless.org, a project to create router firmware that would provide open wireless access to anyone in range of the user’s router. Notionally, in addition to providing Internet access to everyone who needs it, […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDealing With Open Wi-Fi and Public Hotspots
  • Common Misconceptions IT Admins Have on Targeted Attacks

    TrendLabs - Malware Blog
    In our efforts around addressing targeted attacks, we often work with IT administrators from different companies in dealing with threats against their network. During these collaborations, we’ve recognized certain misconceptions that IT administrators — or perhaps enterprises in general — have in terms of targeted attacks. I will cover some of them in this entry, and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCommon Misconceptions IT Admins Have on Targeted Attacks
  • A Look At Repackaged Apps and its Effects in the Mobile Threat Landscape

    TrendLabs - Malware Blog
    Repackaged applications, which are a category of fake applications, play a crucial role in the proliferation of mobile malware. Like fake apps, repackaged apps use social engineering tactics, displaying similar user interface (UI), icon, package names and app labels as the legitimate/official version of the apps they spoofed. This is done to trick users into […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroA Look At Repackaged Apps and its Effects in the Mobile Threat Landscape
  • Introduction to Smart Meters

    TrendLabs - Malware Blog
    While wearable personal technology may be the most “public” face of the Internet of Everything, the most widespread use of it may be in smart meters. What is a smart meter, exactly? It’s a meter for utilities (electricity, gas, or water) that records the consumption of the utility in question, and transmits it to the utility […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroIntroduction to Smart Meters
  • Heuristic Scanning and Sandbox Protection: Best of Both Worlds

    TrendLabs - Malware Blog
    We have been dealing with targeted attacks and know that there is no single technology that can practicably defend an organization’s network against these high-impact campaigns. This is sad, true, but it does mean there are ways to harness security technologies like sandboxing and heuristic scanning so that they work together to protect as a […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroHeuristic Scanning and Sandbox Protection: Best of Both Worlds
  • Being Secure In The Most Connected World Cup Ever

    TrendLabs - Malware Blog
    Sporting events are getting more and more connected, and the just-concluded World Cup is no exception. Brazilian telecom provider Oi made sure that no expense was spared in ‘connecting’ the World Cup , and even claimed that this year’s event is in fact the most connected in the history of the World Cup. Oi claims that they […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBeing Secure In The Most Connected World Cup Ever
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Audit Management Solutions

Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.