Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Trend Micro Experts at Black Hat 2016 to Discuss Ransomware and Critical...

We are excited to announce our participation at this year’s Black Hat USA 2016, taking place July 30 – August 4. Raimund Genes, chief technology officer, and Ed Cabrera, chief cybersecurity officer,...

View Article


Image may be NSFW.
Clik here to view.

The Proof is in the Pudding

If you follow the enterprise security market, you are no doubt inundated by vendors who claim they have the latest and greatest security capability. The challenge is discerning if these claims are...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

Business email compromise: Who’s most at risk and what’s at stake?

Email has completely changed the face of modern communications. Never before has a service provided the speed, convenience and ability to reflect back on past messages quite like email, which is why...

View Article

Image may be NSFW.
Clik here to view.

iOS is not immune to malware

When comparing mobile operating systems, Apple iOS is generally believed to be more secure than Google Android. There are several reasons for this gap: Apple exerts tighter control over its platform....

View Article


Image may be NSFW.
Clik here to view.

Following the mark: Hackers begin to leverage Telegram messaging app

Just as criminals in the real world work to cover their tracks, so too do hackers put in considerable effort to ensure that their digital breadcrumbs can't be followed. At the same time, however,...

View Article

Image may be NSFW.
Clik here to view.

Online fraud: When scams cost billions

In today's internet-connected society, communication has become easier and knowledge of nearly everything is at our fingertips. But this new collaborative internet age comes with a price: Cyber...

View Article

Image may be NSFW.
Clik here to view.

That’s not my boss: How to know when business email accounts have been hacked

Business email compromise schemes are sneaky. By taking advantage of some social engineering techniques and some cyber criminal activity, hackers can send emails to employees that look like they're...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 1, 2016

The number “one” is a very interesting number. Aside from its obvious role in mathematics, it has significance in everything from philosophy, literature, science and technology. Ultimately, it’s the...

View Article


Image may be NSFW.
Clik here to view.

Why is the Deep Web eluding law enforcement?

When most people think of the internet, they tend to imagine their Facebook pages or funny Youtube videos of cats playing the keyboard. While these kinds of sites are probably what the majority of...

View Article

Image may be NSFW.
Clik here to view.

Understanding the Attack Surface for Critical Infrastructure

Over the last year, synchronized and coordinated attacks against critical infrastructure have taken center stage. Remote cyber intrusions at three Ukrainian regional electric power distribution...

View Article

Image may be NSFW.
Clik here to view.

Why ransomware continues to be successful

Ransomware: a word that could strike fear into the heart of every cyber security manager across the board. When it comes to maintaining a secure network, all it takes is for one adverse strain of...

View Article

Image may be NSFW.
Clik here to view.

Step aside, James Bond: Cyber espionage on the rise

It seems that cyber security nightmares keep cropping up. Ransomware and other forms of malware are common threats that are enough of a headache for cyber security managers to deal with. However,...

View Article


Image may be NSFW.
Clik here to view.

Stayed tuned: Smart TV ransomware is just the beginning of IoT extortion

Ransomware has long-since earned its reputation as one of the more prolific cyber security plights burdening hospitals. Recently, it extended its reach into utilities, infecting one organization in...

View Article

Image may be NSFW.
Clik here to view.

Outsourcing crime: How Ransomware-as-a-Service works

The average person generally imagines cyber crime to be associated with stealing, whether that involves the theft of money or information the criminal can sell for a profit. While these threats are...

View Article


Image may be NSFW.
Clik here to view.

Godless malware able to exploit nearly everything

Another day, another strain of malware that cyber security managers have to defend against. Recently, Trend Micro researchers discovered a new family of malicious programs called "Godless" malware...

View Article

Image may be NSFW.
Clik here to view.

Just What the Doctor Ordered: Trend Micro Takes the Hassle Out of Security...

When it comes to healthcare security, media attention is usually focused on the mega breaches – think Anthem, Premera and, most recently, Banner Health. But there is a long tail of smaller...

View Article


Image may be NSFW.
Clik here to view.

It takes a planet: Why international cyber security cooperation is more...

In many ways, the internet has made the world smaller. Communication between people on different continents is now instantaneous. Files and information can be rapidly shared between disparate web...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 8, 2016

A quinceañera is a Latin American “coming of age” celebration of a girl’s fifteenth birthday – similar to that of a Sweet Sixteen celebration in North America or a Bat Mitzvah in the Jewish community....

View Article
Browsing all 527 articles
Browse latest View live