Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities Trend Micro’s H1 2014 Targeted Attack Trends Report finds that threat actors are still largely able to avoid detection by refining their targeted attack methods Singapore,…
Trend Micro Predicts the Rise of Targeted Attacks Across the APAC Region in 2015
Trend Micro Predicts the Rise of Targeted Attacks Across the APAC Region in 2015 Annual prediction report from cybersecurity leader reveals that retail and financial institutions outside of the US will feel the wrath of cybercriminals in 2015 Singapore, November…
Trend Micro Raises Awareness about Microsoft Windows SChannel Vulnerability
Trend Micro Raises Awareness about Microsoft Windows SChannel Vulnerability Versions dating back to Windows ‘95 susceptible SINGAPORE – 14 November 2014 – With the revelation of a nearly two-decade old flaw in Microsoft Windows Secure Channel (SChannel), Trend Micro Incorporated…
[Trend Micro Media Alert] Shellshock emerges in the wild, possibly larger than Heartbleed
Just several hours after the news of Shellshock (covered under CVE-2014-7169) breaking out; it was reportedly being exploited in the wild already. Possibly even larger in scope than Heartbleed, the severity of this vulnerability is serious given that web servers are mostly…
CLOUDSEC 2014 Addresses The Internet of Everything and its Key Security Issues
Annual security conference gathers global and regional experts to share their thoughts on navigating the future landscape of an Internet-Connected society Singapore, 3 September 2014 – CLOUDSEC, one of the leading internet security conferences in Asia Pacific, kicks off…
Trend Micro’s Q2 Security Round-up Highlights Need for Comprehensive Cybersecurity Strategy to Keep Information Secure
Trend Micro’s Q2 Security Round-up Highlights Need for Comprehensive Cybersecurity Strategy to Keep Information Secure Heartbleed, Windows XP and Adobe Flash expose systemic shortcomings Singapore, August 13, 2014 – Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the…
Trend Micro Identifies 8 Backdoor Techniques that Attackers Use to Steal Company Data
Trend Micro Identifies 8 Backdoor Techniques that Attackers Use to Steal Company Data 5 August 2014 – Backdoors let attackers control unprotected computers from just about any network, including public, home, and office systems. Taking advantage of a backdoor’s techniques—the…
Victim Insights around the Russian Hack
Victim Insights around the Russian Hack 7 August 2014 – The recently disclosed Russian hack in which a Russian cyber gang stole billions of passwords from both commercial websites and consumers highlights the challenges we all face in our day to day…
Parents – Do you know what your children are doing online right now?
Singapore, 19 May 2014 – A recent poll conducted by Trend Micro amongst parents in Singapore revealed that approximately half of Singaporean kids and teens (defined as 17 years old and below) own personal devices for accessing the internet, such as laptops,…
TrendLabs 1Q 2014 Security Roundup Report – Cybercrime Hits the Unexpected
Trend Micro Incorporated, the global leader in cloud security, has released its TrendLabs 1Q 2014 Security Roundup Report of the most notable security happenings. This quarter revealed that cybercriminals are targeting entities which were not commonly considered attack targets, such as PoS systems, NTP servers,…
Trend Micro extends Deep Security as a Service on Amazon Web Services in Asia Pacific
Trend Micro extends Deep Security as a Service on Amazon Web Services in Asia Pacific Advanced security solution helps organization securely navigate the cloud SINGAPORE, May 9, 2014 – To enable organizations to fully embrace the cloud with enhanced security and confidence, Trend…
Trend Micro: Threats Roundup 2014
Trend Micro has conducted a summary on the threats in the world of technology. In light of the recent highlight on the Heartbleed bug incident, consumers and corporations could not be too careful when it comes to security. As a…
Internet Explorer Zero-Day Hits All Versions In Use
Over the weekend, Microsoft released Security Advisory 2963983 which describes a new zero-day vulnerability found in Internet Explorer. This remote code execution vulnerability allows an attacker to run code on a victim system if the user visits a website under the control…
Trend Micro Heartbleed Detector Now Available
21 April 2014 – Trend Micro has previously discussed various aspects of the Heartbleed vulnerability in OpenSSL. Last Tuesday, our first blog post covered an analysis of the vulnerability itself, as well as some steps that IT administrators of affected systems could do…
Managing Windows XP’s Risks in a Post Support World
By David Siah, Country Manager, Trend Micro Singapore On April 8, Windows XP will stop receiving support from Microsoft. This ends the lifespan of one of Microsoft’s most successful and long-running operating systems. Rarely has a tech product lasted…