Top IT Security Bloggers

TrendLabs - Malware Blog
  • Risks from Within: Learning from the Amtrak Data Breach

    TrendLabs - Malware Blog
    A recent report published by Amtrak’s Office of the Inspector General revealed that an employee of the passenger rail company had been selling passenger data for two decades. The buyer of this data was none other than the Drug Enforcement Agency, which paid the employee $854,460 over the period. Iowa’s senior senator, Check Grassley, sent a letter […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRisks from Within: Learning from the Amtrak Data Breach
  • 7 Places to Check for Signs of a Targeted Attack in Your Network

    TrendLabs - Malware Blog
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, thus making their detection a big challenge. As we’ve stressed in our previous entry about common misconceptions about targeted attacks, there is no one-size-fits-all solution against it; enterprises need to arm themselves with protection that can provide sensors where needed, as well as IT […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro7 Places to Check for Signs of a Targeted Attack in Your Network
  • Wearing Your Tech on Your Sleeve

    TrendLabs - Malware Blog
    Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some might assume that wearable smart devices are complicated futuristic gadgets. However, they […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWearing Your Tech on Your Sleeve
  • Suspicious Login Message Faked, Distributes Backdoor

    TrendLabs - Malware Blog
    Legitimate services are often used by cybercriminals to try and make their attacks more convincing. Recently, I spotted attacks that used services and platforms like Google Drive and Dropbox in order to look less suspicious to unwary users. I received a spammed message like the one shown right below that supposedly came from Gmail itself. It warned me that someone logged […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSuspicious Login Message Faked, Distributes Backdoor
  • DEF CON 22 Turns up the Heat on Devices

    TrendLabs - Malware Blog
    One resounding – but unsurprising – message from this year’s DEF CON conference in Las Vegas, Nevada was the increase in hacks against IoT devices. The lineup of hacked IoT devices was extensive. Many sessions focused on individual device hacks of consumer devices such as media players, IP cameras, cars, and home automation systems. Other sessions focused on industry-specific […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDEF CON 22 Turns up the Heat on Devices
  • August 2014 Patch Tuesday Includes Two Critical Updates

    TrendLabs - Malware Blog
    Microsoft has rolled out nine security bulletins for their August Patch Tuesday. Two bulletins are rated as Critical, while the rest are rated as Important. Microsoft Windows, Internet Explorer, Microsoft SQL Server, and Microsoft .NET Framework are some of the affected applications that these bulletins covered. One of the most notable bulletins in this month’s cycle is MS14-051, which addresses […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAugust 2014 Patch Tuesday Includes Two Critical Updates
  • The Dangers of the Android FakeID Vulnerability

    TrendLabs - Malware Blog
    Security researchers from Bluebox Labs recently uncovered a vulnerability that may allow malicious apps to impersonate legitimate ones. This vulnerability, dubbed as “FakeID,” is involved with the checking of certificate signatures to prove the legitimacy of applications. What makes this highly notable is that all Android devices running on platforms starting from Android 2.1 (“Éclair”) […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Dangers of the Android FakeID Vulnerability
  • 2Q 2014 Security Roundup: Turning the Tables on Cyber Attacks

    TrendLabs - Malware Blog
    The incidents that cropped up in the months of April to June 2014—from the data breaches, DDoS attacks, to malware improvements and threats to privacy—highlighted the need for enterprises to craft a more strategic response against and in anticipation of security threats. There were plenty of threats to be found in the quarter. There was […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro2Q 2014 Security Roundup: Turning the Tables on Cyber Attacks
  • Checking In On Africa: The Latest Developments in Cybercrime

    TrendLabs - Malware Blog
    In the early 2000s, Africa gained notoriety due to the 419 “Nigerian” scam. This scam involved making payments in exchange for a reward for helping so-called high-ranking Nigerian officials and their families. While all the scams may not have necessarily originated from Africa, the use of Nigerian officials was imprinted upon the public consciousness, thereby […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroChecking In On Africa: The Latest Developments in Cybercrime
  • More Details Regarding the Gizmodo Brazil Compromise

    TrendLabs - Malware Blog
    At the tail end of July, we wrote about Gizmodo Brazil being compromised by cybercriminals in order to lead visitors into downloading backdoor malware into their machine. This is of course a very big deal, since it is a rather large and noteworthy website being hacked into – but it’s par for the course for […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMore Details Regarding the Gizmodo Brazil Compromise
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

IT Compliance Solutions

Enforce compliance consistently and cost-effectively across your organization.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.