Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The continuing threat of POS malware

Point-of-sale systems have seen numerous changes in recent years. From the shift to chip-card readers and the inclusion of new technology for contactless mobile payments, POS systems aren't just for...

View Article


Image may be NSFW.
Clik here to view.

How organizations can protect against new CERBER variations

TrendMicro Ransomware hit hard in 2016, with big attacks, large payouts and many new strains developed to thwart security measures. At the end of last year, Locky and CERBER ransomware families seemed...

View Article


Image may be NSFW.
Clik here to view.

Industrial Robots are Hackable: How Do We Fix Them?

Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now...

View Article

Image may be NSFW.
Clik here to view.

OAuth Phishing On The Rise

Recently there was a significant volume of new phishing emails aimed at capturing access to Google accounts…specifically your email and contacts. You can read more about it at The Verge, Quartz, and...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro Smart Protection Complete Receives 5-Star Review from SC Magazine

The best days are the ones you wake up to good news you weren’t expecting, right? Well, earlier this month we woke up to find out the Trend Micro Smart Protection Complete had received a five-star...

View Article


Image may be NSFW.
Clik here to view.

Leading by Example at the HITRUST Annual Healthcare Cybersecurity Conference

If we’ve learned anything from the past year in cybersecurity, it’s that cybercriminals do not discriminate when it comes to their victims. Hospital systems have been forced to shut down for crucial...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 1, 2017

As you read this blog, I am probably sitting on a beach in Cancun, Mexico getting a nice tan and not thinking about security (well, maybe just a little). A couple of days before I left, I had to deal...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

The Unified Cloud

Throughout the history of cloud computing, 2006 was a momentous year. In 2006 Amazon Web Services released S3, the first pay per GB storage service. By August, they released  EC2, allowing you to spin...

View Article


Image may be NSFW.
Clik here to view.

Pawn Storm – A Look Into this Cyberespionage Actor Group

In April 2017 my monthly threat webinar focused on a cyberespionage group our Forward-Looking Threat Researcher, Feike Hacquebord, has been following for many years and recently published a report into...

View Article

Image may be NSFW.
Clik here to view.

Randstad Group Selects Trend Micro to Protect its Public Cloud Infrastructure

The Randstad Group is currently in the process of consolidating and centralizing its IT infrastructure across 30 IT departments, and will be providing service to more than 40 operating countries across...

View Article

Image may be NSFW.
Clik here to view.

Transforming the Cyber Health of Small HCOs Across the US

When we talk about healthcare breaches, there are some big-name incidents. Yet in reality there’s a huge number of smaller providers who are in the hackers’ sights and maybe don’t have the resources or...

View Article

Image may be NSFW.
Clik here to view.

Accelerating AI Research to Improve Threat Protection

Once the realm of science fiction, artificial intelligence (AI) is now very much science fact. The potential of this ground-breaking technology – and related disciplines including deep learning and...

View Article


Image may be NSFW.
Clik here to view.

Teaming Up with HITRUST to Raise Cybersecurity Standards in Healthcare

From cash-hungry hackers to state-sponsored spies and careless insiders, there’s no shortage of cyber threats facing healthcare organizations (HCOs) today. At Trend Micro, we’ve been protecting...

View Article

Image may be NSFW.
Clik here to view.

Is Your Security Team Setup To Fail?

The ingredients for strong cybersecurity aren’t a secret. In fact, they haven’t changed significantly over the past 20 years—the ingredients are available to almost every organization out there. On the...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 8, 2017

Although I’m still dreaming of the sandy beaches of Cancun, it’s time to get back to reality. Security vulnerabilities never take a holiday and this week is no exception. In addition to our normal...

View Article


Image may be NSFW.
Clik here to view.

WannaCry & The Reality Of Patching

[Editors note: For the latest WannaCry information as it relates to Trend Micro products, please read this support article.]  The WannaCry ransomware variant of 12-May-2017 has been engineered to take...

View Article

Image may be NSFW.
Clik here to view.

WannaCry and the Executive Order

Last week, The White House released its long awaited Executive Order (EO), Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, ironically enough during the same week we...

View Article

Image may be NSFW.
Clik here to view.

Why “Just Patch It!” Isn’t as Easy as You Think

At the Zero Day Initiative (ZDI), we see patches in a way few do. We get the initial report from a researcher, we verify the issue internally, we notify the vendor, and finally we publish some details...

View Article
Browsing all 527 articles
Browse latest View live