Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

2010 – Year of the Zombie Cloud?

2009 has been a notable year for malware and malicious online activity for a number of reasons and several of them relate to what is known as botnets. A zombie, or a bot, is a PC infected by malware...

View Article


Perimeter Inadequacies

While enterprises typically have robust perimeter security such as firewalls and network Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), malware occasionally slips through to...

View Article


Image may be NSFW.
Clik here to view.

Good Clouds, Evil Clouds: Why Microsoft Hasn’t Lost Yet in Cloud Computing

In a recent eWeek interview, Citrix CTO Simon Crosby described Conficker malware as “the world’s largest cloud.” He’s right. Cybercriminals use Conficker to create massive clouds of remotely-controlled...

View Article

Image may be NSFW.
Clik here to view.

New type of cloud emerges: Exploits as a Service (EaaS)

For years now, if you knew where to shop on the shady side of the Internet cloud, you could pick up a botnet for cheap. But it was so much work to log in to IRC and pay with egold that a busy...

View Article

Ambient Cloud News: Skype protocol has been reverse engineered

This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 11, 2016

Earlier this week, Fiat Chrysler announced that it was launching a “bug bounty” for hackers. Inspired by Wired’s Andy Greenberg and his experience as he sat in a Jeep Cherokee that was hacked by...

View Article

Image may be NSFW.
Clik here to view.

Are you prepared for a ransomware attack?

Try as they might, companies are often unprepared when it comes to the security of their IT infrastructure. While organizations have to do everything in their power to plug up every single...

View Article

Image may be NSFW.
Clik here to view.

Why you Should Dig Into Our Mining Threat Paper

Do you think that understanding the cyberthreats the mining industry faces will be helpful for you and your organization’s security? Unless you work in mining, the odds are your answer to the question...

View Article


Image may be NSFW.
Clik here to view.

What to do if you’re infected by Ransomware

If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. We’ve said that we at Trend Micro are here to help you and this post is meant to tell you...

View Article


Image may be NSFW.
Clik here to view.

Announcing Advanced Threat Protection: Some announcements are better than others

I have been going to the same summer camp every year since I was about 5. Back then it was 4 single moms looking for a place to bring their kids for some outdoors fun and a hope that the kids would...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro at Microsoft WPC 16: Securing Multi-Clouds and Simplifying with...

At Trend Micro we pride ourselves on our thriving partner ecosystem, and the Microsoft World Partner Conference in Toronto last week was a fantastic opportunity to connect with the wider ecosystem. As...

View Article

Image may be NSFW.
Clik here to view.

Hackers will go for gold in Rio Olympics

Fresh off the heels of news that Brazilian hackers have turned to Telegram as their replacement for WhatsApp – which these criminals had been using for their surreptitious, sinister communications –...

View Article

Image may be NSFW.
Clik here to view.

Can malware be spotted in TLS without having to decrypt the traffic?

Decryption of traffic encrypted by Transport Layer Security is still a controversial topic. TLS, which has succeeded the deprecated Secure Sockets Layer as the acceptable standard technology for HTTPS...

View Article


Image may be NSFW.
Clik here to view.

Ransomware infects the cloud: What you need to know

Enterprises, small companies and everyone in between is adopting cloud-based tools and environments for their business and personal needs. RightScale's 2016 State of the Cloud report found that 82...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro Ransomware File Decryptor Updated

We’ve said that we at Trend Micro are here to help you with Ransomware. Like I said last week, we’re here to help in two ways: with support and with tools. Today, I wanted to update you and let you...

View Article


Image may be NSFW.
Clik here to view.

The state of cyber crime in the U.K.

Global cyber crime is a fascinating, albeit frightening look into the activities of hackers and the impact they can have on individual businesses and industries overall. Trend Micro researchers have...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 18, 2016

I completely lost track of time all week. According to Wikipedia, “Father Time” is usually associated with an elderly bearded man with wings, dressed in a robe and carrying a scythe and an hourglass....

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 25, 2016

History was made this week in the United States. A woman was officially named the presidential nominee for a major political party. Given the fact that the 19th Amendment of the United States...

View Article
Browsing all 527 articles
Browse latest View live