Assisted Driving with Google – Today and Tomorrow

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 06 Dec 2017 13:00:21 +0000

I have two people I visit often: My college friend lives near Poughkeepsie, NY; my girlfriend is in central New Jersey. Getting to Poughkeepsie is simple – there is one major route from my place in Connecticut, with two variations covering the last few miles. Trips to New Jersey can follow multiple routes, bridging the…

Read more

Optimize Your Mac!

Credit to Author: Michael Miley| Date: Tue, 21 Nov 2017 14:00:53 +0000

Mac laptop and mini users often struggle to optimally use their computer’s memory or to keep their disk clean, since these Macs may be a bit tight on resources to begin with. Users can run out of memory when multiple memory-hogging apps are open, or they can run out of disk space (particularly on the…

Read more

How can I tell if my PC is infected?

Credit to Author: Trend Micro| Date: Tue, 21 Nov 2017 13:00:26 +0000

The IoT may not be as secure as we hoped.4 signs your PC might be infected with malware –  by Brook Stein, Director of Product Management Years ago, computer hackers would brag about how many PCs they infected as a means of showing off their programming skills. They created newsworthy viruses with names like the “ILOVEYOU” or “Anna Kornikova” –named after the beautiful Russian tennis…

Read more

Bad Rabbit Ransomware – What is it and how to stay safe

Credit to Author: Trend Micro| Date: Fri, 27 Oct 2017 16:50:50 +0000

Trend Micro is tracking multiple reports of ransomware infections, known as Bad Rabbit, in many countries around the world. A suspected variant of Petya, Bad Rabbit is ransomware—malicious software that infects a computer and restricts user access to the infected machine until a ransom is paid to unlock it. We want to assure you that the…

Read more

Here’s Why You Should Consider A Career In Cybersecurity

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 25 Oct 2017 19:06:21 +0000

Cybersecurity team working together at a computer workstationThe need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it’s a better representation that “cybersecurity professionals.” In today’s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM),…

Read more

Today’s Predictions for Tomorrow’s Internet

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Thu, 19 Oct 2017 13:00:36 +0000

Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for “the next big thing” to either benefit or to blight our…

Read more

The Equifax Data Breach: What Do I Do Next?

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Thu, 21 Sep 2017 13:00:38 +0000

Email may not be as secure as many people might think.On 8 September, credit reporting agency Equifax confessed to a major data breach. It affects 143 million Americans – nearly half of the US population – and 100,000 Canadian consumers. Unfortunately, this means that the hackers may have access to highly sensitive personal and financial information, allowing them to carry out follow-on attacks and identity…

Read more

Trend Micro Security’s Layered Protection, XGen™ Machine Learning, and Folder Shield Protect You Against Unknown Ransomware and Malware

Credit to Author: Michael Miley| Date: Tue, 19 Sep 2017 13:00:30 +0000

Millennials may be tech-savvy, but they're not necessarily up to speed on the latest cyber security protocols.On May 12 of 2017, the WannaCry ransomware struck across the globe, encrypting computers by exploiting a critical vulnerability in Windows, first discovered by the US National Security Agency. Among its first targets were the British National Health Service, Federal Express, and Telefonica, but soon banks, schools, hospitals, government agencies and other organizations were infected,…

Read more