This Week in Security News: Magecart Attacks and Is Your Smart TV Spying on You?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 20 Sep 2019 13:05:20 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Magecart attacks and the security implications of PSD2. Also, read about how your smart TV might be leaking your data to the likes of Facebook,…

The post This Week in Security News: Magecart Attacks and Is Your Smart TV Spying on You? appeared first on .

Read more

Beyond The Standard CISO Cloud Security Guide

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 19 Sep 2019 13:53:11 +0000

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…

The post Beyond The Standard CISO Cloud Security Guide appeared first on .

Read more

There She Breaches! Watch Out For Your Identity Data!

Credit to Author: Trend Micro| Date: Wed, 18 Sep 2019 13:06:03 +0000

Data breaches keep on coming. Here’s what you can do to stay ahead of the hackers Money makes the world go around. It’s the glue that holds our society together and the engine that drives our economy. But it’s also coveted by a growing global population of highly resourceful and determined cyber-criminals. They’re out to…

The post There She Breaches! Watch Out For Your Identity Data! appeared first on .

Read more

This Week in Security News: IoT Devices Are a Target in Cybercriminal Underground

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Sep 2019 13:18:33 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how fileless malware abuses PowerShell. Also, read how Trend Micro researchers are pulling back the curtain on the cybercriminal underground to warn consumers and businesses about…

The post This Week in Security News: IoT Devices Are a Target in Cybercriminal Underground appeared first on .

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

This Week in Security News: New Zero-Day Vulnerability Findings and Mobile Phishing Scams

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 06 Sep 2019 13:05:31 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how music festival goers need to be on guard for phishing attacks when trying to find a lost iPhone. Also, read how Trend Micro researchers went…

The post This Week in Security News: New Zero-Day Vulnerability Findings and Mobile Phishing Scams appeared first on .

Read more

Finding a Better Route to Router and Home Network Security

Credit to Author: Trend Micro| Date: Wed, 04 Sep 2019 14:05:00 +0000

When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box (technically known as a gateway, combining modem and router in one device), there’s even less incentive…

The post Finding a Better Route to Router and Home Network Security appeared first on .

Read more

This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 03 Sep 2019 17:36:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six…

The post This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common appeared first on .

Read more

Three Common Email Security Mistakes That MSPs Make

Credit to Author: Trend Micro| Date: Tue, 27 Aug 2019 20:20:02 +0000

  MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them—if they avoid three common mistakes.   Businesses have come to rely on cloud email and file-sharing applications for communication and productivity. But, too often, they assume these platforms’ built-in security delivers enough protection against email-borne…

The post Three Common Email Security Mistakes That MSPs Make appeared first on .

Read more

This Week in Security News: DevOps Implementation Concerns and Malware Variants

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 23 Aug 2019 14:01:24 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how most respondents to a Trend Micro survey shared their concern for the risks in implementing DevOps. Also, read on about how Trend Micro uncovered…

The post This Week in Security News: DevOps Implementation Concerns and Malware Variants appeared first on .

Read more