Quantcast
Channel: Trend Cloud Security Blog - Cloud Computing Experts » Cyber crime
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Ambient Cloud News: Skype protocol has been reverse engineered

This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...

View Article



Image may be NSFW.
Clik here to view.

The State of Cloud and Virtualization Security

For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to...

View Article

Image may be NSFW.
Clik here to view.

What Are the True Dangers of the Cloud?

We often hear that security and privacy concerns are the main inhibitors to cloud adoption.  But what are the true threats?  Is the cloud really more dangerous than your on-site data center?  I would...

View Article

Image may be NSFW.
Clik here to view.

Do You Encrypt Your Data? A Plea to Businesses from an Identity Theft Victim

Recently I became a victim of identity theft.  Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number.  I’ve spent the last...

View Article

Image may be NSFW.
Clik here to view.

How to Thwart the Digital Insider: an Advanced Persistent Response to...

One of the oft-repeated themes in media reporting of cyber security events is that the “threat landscape is constantly evolving,” that attacks are becoming increasingly sophisticated and targeted and...

View Article


Image may be NSFW.
Clik here to view.

TweetChat: Advanced Persistent Threats

Ready to join the conversation? We’re hosting a LIVE TweetChat on October 9, 2012, at 9am PDT, to discuss Advanced Persistent Threats, the development of these sophisticated attacks, and how companies...

View Article

Image may be NSFW.
Clik here to view.

Operation Ghostclick: Cracking down on Cyber Criminals

Rove Digital was a company formed by a criminal organization in Estonia with two business models: one to portray itself as a legitimate business on the surface, but the second and main purpose was to...

View Article

Image may be NSFW.
Clik here to view.

Changing Seasons in Security bring APTs to Forefront

Birds are beginning to leave their nests and fly south as winter slowly encroaches. The migration of our feathered friends ushers in the new season. As the seasons change so to have the targeted...

View Article


Image may be NSFW.
Clik here to view.

The Knight Fork: Defining Cyber Defense in 2013

“A knight’s fork: an attack by one chess piece (as a knight) on two pieces simultaneously.” - Merriam-Webster Dictionary When was the last time you played chess? If you are responsible for...

View Article


Image may be NSFW.
Clik here to view.

Spear Phishing and Advanced Targeted Attacks

As the saying goes, everything old is new again. Spear phishing may be a timeworn technique, but it continues to be effective even in today’s Web 2.0 landscape. In modern hacking, the practice is...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images