22 Jump Street, Transformers Are Top Movie Lures for Summer
Summertime has become synonymous with blockbuster movies. Unfortunately, these movies have become a go-to social engineering lure used by cybercriminals. Just like in previous years, Trend Micro engineers searched for possible threats related to movies released during the summer. This year, 22 Jump Street was the top movie used for social engineering. Transformers: Age of […] more…Need to Amp Your Internet Safety ‘Street Smarts’?
Okay, let’s just say it: The topic of Internet safety is not exactly glamorous. It rarely makes headlines until after a safety breech rattles your family. Moreover, the topic is loaded with ever-evolving tech terms that can leave your head spinning. Still the fact remains that understanding Internet safety in today’s wired world is just […] more…New Cash Registers Are Sexy, But What’s Beneath the Counter Matters More
Anointed the next Steve Jobs by some admirers, Twitter inventor and Square CEO Jack Dorsey is one of the few people who can get the Silicon Valley press corps to roll out of bed early to hear what he has to say. Unlike Jobs, Dorsey spoke from a table at Blue Bottle Coffee near Square’s […] more…Barking Up The Wrong Tree
Recently, it was announced that such well-known names in the tech industry such as Facebook, Twitter, Microsoft, and Apple had all been affected by a watering hole attack. Employees at all of these affected firms had visited a popular iOS developer forum, which was compromised to serve a then-unknown Java exploit to its users. Unsurprisingly, […] more…Chromium explained: How the open-source engine drives today’s browsers
3 facts to know about Chromium > Chromium provides the core engine, network stack, and architecture for Google Chrome, Microsoft Edge, and other major web browsers. The project’s code lineage traces back to 2001, forking from Apple’s WebKit. Unlike Chrome, the pure Chromium build lacks proprietary Google features like automatic updates, licensed media codecs, and […] more…Apple’s iPhone has regained the smartphone sales crown
Even as it prepares to further diversify its iPhone range, Apple is about to regain the smartphone crown from Samsung, according to analysts from Counterpoint. “Apple is set to dethrone Samsung in shipments for the first time in 14 years and will maintain the top spot through 2029,” Counterpoint said, noting that global smartphone sales are expected […] more…Breaking the humanoid robot delusion
A Silicon Valley company called 1X this week announced a humanoid robot that does all your housework. The robot is called NEO. The company says NEO is the world’s first consumer-ready humanoid robot for the home. It is designed to automate routine chores and offer personal help so you can spend time on other things. The company’s odd, 70’s style demonstration […] more…What’s next after agentic AI? Physical AI, Nvidia says
Nvidia, a major force behind the rise of generative AI (genAI) in recent years, now sees physical AI as the next step in the technology’s evolution. “The next wave is physical AI,” Kari Briski, vice president for generative AI software for enterprises at Nvidia, said during a briefing ahead of the company’s GTC trade show in Washington, DC. Today, […] more…Everything we know about Apple Intelligence
Apple devices support Apple Intelligence, the growing collection of artificial intelligence (AI) tools the company began to roll out in October 2024. These include both consumer-friendly tools such as automatic mixing in Apple Music alongside a growing selection of increasingly powerful tools to get tasks done, ranging from writing tools to image creation, visual intelligence, […] more…Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago, a complete set of Tier 20 armor in World of Warcraft, or a Steam account loaded with your favorite titles. Hackers love it too. Because they can make money off it. Hackers have been stealing […] more…The story of the year: ransomware in the headlines
In the past twelve months, the word “ransomware” has popped up in countless headlines worldwide across both print and digital publications: The Wall Street Journal, the BBC, the New York Times. It is no longer just being discussed by CISOs and security professionals, but politicians, school administrators, and hospital directors. Words like Babuk and REvil […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…How to Prepare for Your Child’s First Smartphone
If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels and riding out into the neighborhood for the first time, a smartphone opens an entirely new world for children. There are apps, social media, group chats with friends, TikTok stars, and the joy of simply being “in” with their classmates and […] more…Privacy predictions for 2021
2020 saw an unprecedented increase in the importance and value of digital services and infrastructure. From the rise of remote working and the global shift in consumer habits to huge profits booked by internet entertainers, we are witnessing how overwhelmingly important the connected infrastructure has become for the daily functioning of society. What does all […] more…DDoS attacks in Q3 2020
News overview Q3 was relatively calm from a DDoS perspective. There were no headline innovations, although cybercriminals did continue to master techniques and develop malware already familiar to us from the last reporting period. For example, another DDoS botnet joined in the assault on Docker environments. The perpetrators infiltrated the target server, created an infected […] more…Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts
By Marshall Chen, Loseway Lu, Yorkbing Yap, and Fyodor Yarochkin (Trend Micro Research) A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020. The recent campaigns target senior positions in the United […] more…More information
- FBI Warns of Employee Credential Phishing via Phone, Chat
- Google may be working on secret ‘Ultra Pixel’ without navigation keys
- Google to Automatically Enable Two-Step Verification for Some Accounts
- Windows 10’s market share is more than hanging in there despite being at end of support
- Next-gen firewalls require external visibility tools
- Sprint cripples Galaxy S III via ‘security update’: Bye, bye universal search
- Kaspersky Launches Targeted Attack Protection Platform
- Tech Talk: Prepping for GDPR
- Twitter implementing Mozilla’s Do Not Track feature
- The Age of the Drone Police Is Here