Trend Micro Experts at Black Hat 2016 to Discuss Ransomware and Critical...
We are excited to announce our participation at this year’s Black Hat USA 2016, taking place July 30 – August 4. Raimund Genes, chief technology officer, and Ed Cabrera, chief cybersecurity officer,...
View ArticleThe Proof is in the Pudding
If you follow the enterprise security market, you are no doubt inundated by vendors who claim they have the latest and greatest security capability. The challenge is discerning if these claims are...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleBusiness email compromise: Who’s most at risk and what’s at stake?
Email has completely changed the face of modern communications. Never before has a service provided the speed, convenience and ability to reflect back on past messages quite like email, which is why...
View ArticleiOS is not immune to malware
When comparing mobile operating systems, Apple iOS is generally believed to be more secure than Google Android. There are several reasons for this gap: Apple exerts tighter control over its platform....
View ArticleFollowing the mark: Hackers begin to leverage Telegram messaging app
Just as criminals in the real world work to cover their tracks, so too do hackers put in considerable effort to ensure that their digital breadcrumbs can't be followed. At the same time, however,...
View ArticleOnline fraud: When scams cost billions
In today's internet-connected society, communication has become easier and knowledge of nearly everything is at our fingertips. But this new collaborative internet age comes with a price: Cyber...
View ArticleThat’s not my boss: How to know when business email accounts have been hacked
Business email compromise schemes are sneaky. By taking advantage of some social engineering techniques and some cyber criminal activity, hackers can send emails to employees that look like they're...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 1, 2016
The number “one” is a very interesting number. Aside from its obvious role in mathematics, it has significance in everything from philosophy, literature, science and technology. Ultimately, it’s the...
View ArticleWhy is the Deep Web eluding law enforcement?
When most people think of the internet, they tend to imagine their Facebook pages or funny Youtube videos of cats playing the keyboard. While these kinds of sites are probably what the majority of...
View ArticleUnderstanding the Attack Surface for Critical Infrastructure
Over the last year, synchronized and coordinated attacks against critical infrastructure have taken center stage. Remote cyber intrusions at three Ukrainian regional electric power distribution...
View ArticleWhy ransomware continues to be successful
Ransomware: a word that could strike fear into the heart of every cyber security manager across the board. When it comes to maintaining a secure network, all it takes is for one adverse strain of...
View ArticleStep aside, James Bond: Cyber espionage on the rise
It seems that cyber security nightmares keep cropping up. Ransomware and other forms of malware are common threats that are enough of a headache for cyber security managers to deal with. However,...
View ArticleStayed tuned: Smart TV ransomware is just the beginning of IoT extortion
Ransomware has long-since earned its reputation as one of the more prolific cyber security plights burdening hospitals. Recently, it extended its reach into utilities, infecting one organization in...
View ArticleOutsourcing crime: How Ransomware-as-a-Service works
The average person generally imagines cyber crime to be associated with stealing, whether that involves the theft of money or information the criminal can sell for a profit. While these threats are...
View ArticleGodless malware able to exploit nearly everything
Another day, another strain of malware that cyber security managers have to defend against. Recently, Trend Micro researchers discovered a new family of malicious programs called "Godless" malware...
View ArticleJust What the Doctor Ordered: Trend Micro Takes the Hassle Out of Security...
When it comes to healthcare security, media attention is usually focused on the mega breaches – think Anthem, Premera and, most recently, Banner Health. But there is a long tail of smaller...
View ArticleIt takes a planet: Why international cyber security cooperation is more...
In many ways, the internet has made the world smaller. Communication between people on different continents is now instantaneous. Files and information can be rapidly shared between disparate web...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 8, 2016
A quinceañera is a Latin American “coming of age” celebration of a girl’s fifteenth birthday – similar to that of a Sweet Sixteen celebration in North America or a Bat Mitzvah in the Jewish community....
View Article