Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • How to Clear the Cache on Your Mac

    Trend Micro - Cloud Security Blog
    Have you ever wondered why your Mac is running slow? Does it freeze when performing even just the simplest of tasks? Does it take a while to launch and switch programs? Everybody has gone through this excruciating pain at least once. Even though the Mac is known to be a high-performance machine, it disappoints us...
    The post How to Clear the Cache on Your Mac appeared first on .
  • Stop Impersonations of Your CEO by Checking the Writing Style

    Trend Micro - Cloud Security Blog
    If one of your employees receives an email that looks like it’s from the CEO asking to send sensitive data or to make a wire transfer, could that employee spot it as a fake based on how it is written? He or she may be so concerned with pleasing the CEO that they may urgently...
    The post Stop Impersonations of Your CEO by Checking the Writing Style appeared first on .
  • How to Remove Malware from Your MacOS Computer

    Trend Micro - Cloud Security Blog
    Who says Macs don’t get viruses? If you think Windows is a virus magnet, the claim that Macs are completely immune to viruses is false. They may be less frequent and common than the Windows variety, but they do exist. But you’re not helpless against the malware onslaught. There are plenty of ways to improve...
    The post How to Remove Malware from Your MacOS Computer appeared first on .
  • The Risk of IoT Security Complacency

    Trend Micro - Cloud Security Blog
    Trend Micro recently surveyed 1,150 IT executives globally. We found a gap between the perceived risk from IoT and the planned mitigation for that risk. Most senior executives recognize that IoT can introduce security risk to the organization, but few will invest resources to remediate that risk. Click here for more details. Senior leadership should...
    The post The Risk of IoT Security Complacency appeared first on .
  • Securing the Convergence of IT with OT

    Trend Micro - Cloud Security Blog
    The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well. Beginning with the network, IT and OT use different protocols. Within the OT world, vendors have created many proprietary...
    The post Securing the Convergence of IT with OT appeared first on .
  • BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

    Trend Micro - Cloud Security Blog
    For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack...
    The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .
  • This Week in Security News: Air Canada and Cryptojacking

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Air Canada reported a data breach that exposed passport details for more than 20,000 customers on their mobile app. Also, Trend Micro’s Midyear Security Roundup reported an...
    The post This Week in Security News: Air Canada and Cryptojacking appeared first on .
  • Cybercriminals Changing Tactics as Seen in First Half Report

    Trend Micro - Cloud Security Blog
    Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends...
    The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .
  • This Week in Security News: Facebook and Faxploits

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created...
    The post This Week in Security News: Facebook and Faxploits appeared first on .
  • Simplifying and Prioritizing Advanced Threat Response Measures

    Trend Micro - Cloud Security Blog
    I had to go to the doctor the other day because I was miserable and sick. I don’t like going to the doctor so I waited until my stuffy nose and congestion turned into a full blown sinus infection. The doctor said this thing was going around, and I should be better in a few...
    The post Simplifying and Prioritizing Advanced Threat Response Measures appeared first on .

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release