simply-security-logo

 

23 February 2019

  • Trend Micro Internet Security Wins a “Best Protection” Award for 2018 from AV-TEST

    February 21, 2019. If the main criterion for judging the value of a security application is how well it protects your computer from web and email threats, malware and viruses, then both users and potential users of Trend Micro Internet Security will be happy to hear that the product has been given a “Best

    ...
  • This Week in Security News: Malware and Machine Learning

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an infectious miner-malware and how malware can hide form AV Solutions. Also, understand how to use machine learning to detect malware outbreaks with

    ...
  • Trend Micro Antivirus for Mac 2019 is Certified by AV-TEST with Top Scores for Protection, Performance, and Usability

    Current and potential users of the latest edition of Trend Micro Antivirus for Mac (v9.0, for 2019) will be pleased to know that it achieved MacOS Certification and top scores in all three categories in the recent AV-TEST Product Review and Certification Report – Dec/2018. Trend Micro Antivirus for Mac was tested

    ...
  • A Game of Risk with Broadcasters, Cyber Felons and Dragons

    Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes

    ...
  • This Week in Security News: Cloud Risks and Container Vulnerability

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about this year’s current uses and emerging risks of the cloud. Also, find out what new vulnerability was found in containers. Read on:  Attacking Containers

    ...
  • Don’t Blame Employees who fall for a BEC scam!

    The BBC reports that a media company based in Scotland is now suing a former employee who fell for a Business Email Compromise (BEC) scam. In the scam, the employee received emails which appeared to be from the managing director and requested wire transfers. The employee worked with her line manager on the first

    ...
  • Part 2: Mobile Banking and Buying: Best Practices

    In the first part of this two-part blog, we outlined the kinds of banking and buying you can do on your mobile device, but also the things to watch out for. You might have noticed that our cautionary notes center around four threat vectors you need to track to stay safe: device, app, network, and...

    The post ...

  • The Cloud in 2019: Current Uses and Emerging Risks

    In the current tech landscape, one would be hard-pressed to find an organization that operates without the help of cloud environments and capabilities. From data storage and document sharing to enabling remote access and communication, the cloud represents the most critical linchpin of today’s IT-focused business

    ...
  • Attacking Containers and runC

    This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and

    ...
  • Part 1: Mobile Banking and Buying – The Good and the Bad

    Banking and buying with your mobile device is powerful and convenient—and in some ways safer than using your bank card. You can check your balance, make secure payments, deposit checks, and transfer funds. You can even connect your debit or credit card to Apple or Google Pay (or another payment service) for quick and

    ...