Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • This Week in Security News: Hijacks and Healthcare

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Singapore looks into the effectiveness of virtual browsers in an attempt to reduce cyberattacks on healthcare systems. Also, cybercriminals have hijacked the computer servers of the Professional...
    The post This Week in Security News: Hijacks and Healthcare appeared first on .
  • Fighting the Skills Gap Via Industry Leading Research and Inspiring Events

    Trend Micro - Cloud Security Blog
    By Kevin Simzer Among the headline-grabbing reports of election hacking, nation-state raids on utilities firms, and mega-data breaches, few outside the industry ask the question: Did the cybersecurity skills shortage play a part? It’s impossible to say for sure. However, what we do know is that chronic industry skills gaps are putting organizations across the...
    The post Fighting the Skills Gap Via Industry Leading Research and Inspiring Events appeared first on .
  • How to Restore Your Mac to Factory Settings

    Trend Micro - Cloud Security Blog
    Restoring your Mac to the factory settings can help fix problems if nothing else has worked. You should also restore your Mac to the factory settings before giving away or selling it to get rid of all your personal files and information. Because following the instructions below will wipe out all of the data on...
    The post How to Restore Your Mac to Factory Settings appeared first on .
  • How to Fix a Mac Stuck on a White Screen

    Trend Micro - Cloud Security Blog
    If a plain white screen appears when your Mac starts, then some of its hardware or software may have failed. Follow the steps below to solve the problem. 1. Check your Mac’s hardware systematically. To find a malfunctioning device attached to your Mac, start by disconnecting everything from it, including peripherals with a Bluetooth or...
    The post How to Fix a Mac Stuck on a White Screen appeared first on .
  • This Week in Security News: Facebook and Feds

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook’s chief security officer resigned as Facebook steps up its cybersecurity efforts. Also, Feds indicted three Ukrainians charged with stealing data on 15 million payment cards from...
    The post This Week in Security News: Facebook and Feds appeared first on .
  • Why Enterprises Still Have to Worry about Eavesdropping

    Trend Micro - Cloud Security Blog
    When one thinks about eavesdropping, a mental image of a shadowy stranger, hiding behind a corner and listening in on others’ conversations may come to mind. With the rise of VoIP calling, however, enterprises became aware of digital eavesdropping that impacted their corporate business calls. Now, though, much of the concern surrounding eavesdropping has been...
    The post Why Enterprises Still Have to Worry about Eavesdropping appeared first on .
  • A Look at Scan4You and the Counter Antivirus Service Landscape

    Trend Micro - Cloud Security Blog
    The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program...
    The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .
  • Phishing, Part 2: Staying Safe

    Trend Micro - Cloud Security Blog
    As mentioned in Phishing Part 1: On the Lookout, phishing attacks have been around for years, but today’s cybercriminals are adept at using them in an ever-increasing variety of ways to get what they want. According to the most recent FBI figures, phishing and its variants was the third most popular cybercrime type in 2017,...
    The post Phishing, Part 2: Staying Safe appeared first on .
  • Phishing, Part 1: On the Lookout

    Trend Micro - Cloud Security Blog
    Cybersecurity has gone mainstream, thanks in part to the hacking of the 2016 Presidential election. But how many of us know how the attackers in this case actually achieved their ends? The truth is, that one of the oldest, but most effective weapons in the cybercriminal’s arsenal, undoubtedly used in those attacks, is a threat...
    The post Phishing, Part 1: On the Lookout appeared first on .
  • Which specific malware trends should American businesses be prepared for?

    Trend Micro - Cloud Security Blog
    In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and data. After all, with each new day comes a sophisticated...
    The post Which specific malware trends should American businesses be prepared for? appeared first on .

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release