Monthly Archives: February 2016

Trend Micro Named a Leader in 2016 Gartner Endpoint Protection Platforms Magic Quadrant

TM download

Today’s threat landscape has never been more volatile or dangerous. Given what’s at stake, it can be difficult for IT buyers to know which provider to turn to keep critical corporate data secure, their users’ endpoints and servers up and running, and compliance officers happy. Continue reading

Mobile devices in healthcare: how secure are they?

Health-care-devices-need-to-be-secure_459_40106460_0_14117435_300-300x200Trend Micro researchers noted that the future of mobile tech in health care is bright. Wearable devices and technologies driven by the Internet of Things are beginning to contribute to a better health landscape. For instance, these wearables can track fitness levels and even blood sugar for those with diabetes, and they will soon be (or in some cases already are) able to track blood pressure, heart rate and respiratory rate, among other important metrics. Continue reading

When Apps Act Like Gods: Your Apps Could Compromise Your Privacy

app-privacyPopular ride-sharing mobile application Uber was recently made to pay a $20,000 fine in New York, following a 14-month investigation into a 2014 incident that exposed information that included names and license numbers of over 50,000 present and former drivers. Uber Technologies, Inc., the billion-dollar startup behind the app, also received flak after it was found that the app could snoop on its riders’ locations without consent. Continue reading

What not to do in 2016: A list of “don’ts” for CIOs

CIOs 2016Last year was a big year for cyber security – and not necessarily in a good way. A few high-profile data breaches made the news, according to Network World, including several that involved health insurance companies (e.g., Anthem and Premera) and one huge breach on an important federal government office (the Office of Personnel Management). The latter especially was cause for concern, as the confidential information of almost 22 million current and former federal employees was stolen, along with the biometric data of 5 million people. Continue reading

Hackers are targeting critical infrastructure

power-outageJust one month after the Ukrainian power network was the victim of a cyber attack, hackers did it again last week. This time they were able to penetrate the national electricity network of Israel. Minister of energy Steinitz announced this news himself, when the attack was still in full force. Contrary to in Ukraine, where the virus was detected and eliminated in time. Although the damage in the last attack was fairly limited, these two recent events demonstrate how hackers are more and more aiming at infrastructural targets. Continue reading