Category Archives: Consumerization and BYOD

Pacemaker security risks: the ‘heart of the matter’ brought by RTL … and explained by Trend Micro

The problem is not new to security specialists, but it gradually sinks in with the rest of the world as well: the more pacemakers are connected to the internet for any form of communication, the more security risks arise. Following a recall action by pacemaker manufacturer Abbott, thousands of Belgians had to come to the hospital to have their device upgraded, on order to shield it from possible hacking events. Continue reading

Here’s Why You Should Consider A Career In Cybersecurity

The need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it’s a better representation that “cybersecurity professionals.” In today’s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM), let’s take a closer look at what a career in cybersecurity looks like. Continue reading

HTTPS: the importance of the S

Starting October, Chrome will show a “NOT SECURE” warning when users enter text in a form on HTTP pages.” That was an e-mail recently sent out by Google. If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. Meet the S in HTTPS.

Continue reading

6.5 million Belgians use unprotected computers

schermafbeelding-2016-10-10-om-08-11-17The entire month of October is European CyberSecMonth, when the EU tries to raise more awareness with citizens of cyber security threats and provide up to data information on how to protect your computer on the internet. Yesterday on the evening news it was said that almost 6.5 million Belgians are using unprotected computers, so the #CyberSecMonth is definitely a necessary campaign.  Continue reading

Penetration testing: Researchers successfully hack a vibrator

phone-958066_960_720Cyber security researchers have gone to great lengths in their efforts to raise awareness about the cyber threat-laden world we’re living in. They’ve hacked cars on the highway, found ways to sneak into the power grid, tried to break into airplane infotainment systems and even managed to get into Ashley Madison’s database.

But of all the penetration testing stunts to date, one recent demonstration in Germany really hits below the belt. Continue reading

When Apps Act Like Gods: Your Apps Could Compromise Your Privacy

app-privacyPopular ride-sharing mobile application Uber was recently made to pay a $20,000 fine in New York, following a 14-month investigation into a 2014 incident that exposed information that included names and license numbers of over 50,000 present and former drivers. Uber Technologies, Inc., the billion-dollar startup behind the app, also received flak after it was found that the app could snoop on its riders’ locations without consent. Continue reading

CES 2016: Many More Reasons for a ‘Bring Your Own Wearables’ Policy

2016_01_CES2016 has barely started, and the world’s biggest technology show has already come to an end. Last week, all people and firms involved in the digital world were watching or – if possible – attending CES (Consumer Electronics Show) 2016, the world’s largest consumer electronics trade show. As always, Las Vegas provided the backdrop as we got a tantalizing glimpse into the future. And like last year, much of the focus centered on the Internet of Things. From smart cars over Belgian drones to fridges becoming family hubs: the digital future promises to be extremely connected. Continue reading

As 600 million users are exposed to password hack, are your employee devices safe?

By Albert Kramer

Data-wissen-Trend-MicroBring Your Own Device (BYOD) has for the past few years been both a cause of sleepless nights for security bosses and a major flash point between the business and IT. To that we can now add wearable technology – smart watches, fitness trackers, head-mounted displays and the like which threaten to leak corporate data and expand the enterprise risk surface even further. IT consumerisation took another hit this month when research revealed that some of the most popular apps in the world have password brute force vulnerabilities, exposing as many as 600 million Android and iOS users. Continue reading

Trend Micro Positioned as a Leader Again in Gartner Magic Quadrant for Endpoint Protection Platforms

post4We all know that it’s getting harder and harder for IT security managers to defend corporate systems. A perfect storm of static or dwindling resources, complex IT environments, a growing attack surface, and the increasing volume and sophistication of threats has made it one of the most difficult jobs in IT. That’s why to the time-poor IT buyer, trusted third-party reports like Gartner’s Magic Quadrant have become regarded as valuable sources of information during purchasing cycles.

Continue reading