2010 – Year of the Zombie Cloud?
2009 has been a notable year for malware and malicious online activity for a number of reasons and several of them relate to what is known as botnets. A zombie, or a bot, is a PC infected by malware...
View ArticlePerimeter Inadequacies
While enterprises typically have robust perimeter security such as firewalls and network Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), malware occasionally slips through to...
View ArticleGood Clouds, Evil Clouds: Why Microsoft Hasn’t Lost Yet in Cloud Computing
In a recent eWeek interview, Citrix CTO Simon Crosby described Conficker malware as “the world’s largest cloud.” He’s right. Cybercriminals use Conficker to create massive clouds of remotely-controlled...
View ArticleNew type of cloud emerges: Exploits as a Service (EaaS)
For years now, if you knew where to shop on the shady side of the Internet cloud, you could pick up a botnet for cheap. But it was so much work to log in to IRC and pay with egold that a busy...
View ArticleAmbient Cloud News: Skype protocol has been reverse engineered
This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 11, 2016
Earlier this week, Fiat Chrysler announced that it was launching a “bug bounty” for hackers. Inspired by Wired’s Andy Greenberg and his experience as he sat in a Jeep Cherokee that was hacked by...
View ArticleAre you prepared for a ransomware attack?
Try as they might, companies are often unprepared when it comes to the security of their IT infrastructure. While organizations have to do everything in their power to plug up every single...
View ArticleWhy you Should Dig Into Our Mining Threat Paper
Do you think that understanding the cyberthreats the mining industry faces will be helpful for you and your organization’s security? Unless you work in mining, the odds are your answer to the question...
View ArticleWhat to do if you’re infected by Ransomware
If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. We’ve said that we at Trend Micro are here to help you and this post is meant to tell you...
View ArticleAnnouncing Advanced Threat Protection: Some announcements are better than others
I have been going to the same summer camp every year since I was about 5. Back then it was 4 single moms looking for a place to bring their kids for some outdoors fun and a hope that the kids would...
View ArticleTrend Micro at Microsoft WPC 16: Securing Multi-Clouds and Simplifying with...
At Trend Micro we pride ourselves on our thriving partner ecosystem, and the Microsoft World Partner Conference in Toronto last week was a fantastic opportunity to connect with the wider ecosystem. As...
View ArticleHackers will go for gold in Rio Olympics
Fresh off the heels of news that Brazilian hackers have turned to Telegram as their replacement for WhatsApp – which these criminals had been using for their surreptitious, sinister communications –...
View ArticleCan malware be spotted in TLS without having to decrypt the traffic?
Decryption of traffic encrypted by Transport Layer Security is still a controversial topic. TLS, which has succeeded the deprecated Secure Sockets Layer as the acceptable standard technology for HTTPS...
View ArticleRansomware infects the cloud: What you need to know
Enterprises, small companies and everyone in between is adopting cloud-based tools and environments for their business and personal needs. RightScale's 2016 State of the Cloud report found that 82...
View ArticleTrend Micro Ransomware File Decryptor Updated
We’ve said that we at Trend Micro are here to help you with Ransomware. Like I said last week, we’re here to help in two ways: with support and with tools. Today, I wanted to update you and let you...
View ArticleThe state of cyber crime in the U.K.
Global cyber crime is a fascinating, albeit frightening look into the activities of hackers and the impact they can have on individual businesses and industries overall. Trend Micro researchers have...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 18, 2016
I completely lost track of time all week. According to Wikipedia, “Father Time” is usually associated with an elderly bearded man with wings, dressed in a robe and carrying a scythe and an hourglass....
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 25, 2016
History was made this week in the United States. A woman was officially named the presidential nominee for a major political party. Given the fact that the 19th Amendment of the United States...
View Article