Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

Presenting Mobile Pwn2Own 2016

After taking a year off to do some paperwork, the Zero Day Initiative (ZDI) invites you to join us for the fifth annual Mobile Pwn2Own competition, to be held this year on October 26 and 27 at the...

View Article


Image may be NSFW.
Clik here to view.

Cyber extortion proves importance of email security

Nefarious individuals have used extortion as a means of making money for as long as crime has existed. However, past schemes generally involved harm to expensive objects or even the victim himself....

View Article

Image may be NSFW.
Clik here to view.

Surprise surprise, cyber criminals aren’t honest

Cyber crime is a major concern, both for consumers and enterprises alike. The connectivity of the internet has allowed for some pretty incredible innovations, but it's also allowing criminals an...

View Article

Image may be NSFW.
Clik here to view.

The deck is stacked against APAC: Lack of cyber security awareness preludes...

Political philosopher, writer and U.S. founding father Thomas Jefferson once stated that, "Education is the great equalizer." When it comes to cyber security, this couldn't be more true.  Modern...

View Article


Image may be NSFW.
Clik here to view.

Protecting Your Enterprise against a New Generation of Cybercriminals

Cybercrime as a Service (CaaS) has been a growing trend throughout Deep Web forums for several years. Inexperienced and, quite frankly, lazy cybercriminals can purchase CaaS tools and services from...

View Article

Image may be NSFW.
Clik here to view.

New Trend Micro Ransomware Research Shows Firms Should Wise Up, Not Pay Up

Most IT leaders have by now either encountered ransomware or know someone who has. But how many really understand the threat, its potential impact on the organization and how best to mitigate it? To...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

Keeping the SDDC Security Conversation Going: Life after VMworld 2016

An estimated 23,000 high tech professionals spent last week in Las Vegas listening to the VMware team share their vision for the software defined data center (SDDC) at VMworld 2016. During the keynote...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 5,...

I used to dread the Labor Day holiday in the United States because it signified the end of our summer, my favorite season. It wasn’t until I learned the background behind the holiday that I truly...

View Article

Image may be NSFW.
Clik here to view.

Enjoy Your Digital Life Safely with Trend Micro Security for 2017

Trend Micro is proud to announce the availability of Trend Micro™ Security for 2017 – our newest release of the industry-leading security software that lets you enjoy your digital life safely. In...

View Article

Image may be NSFW.
Clik here to view.

Angler: The Rise and Fall of an Exploit Kit

In late 2013, the then-infamous Blackhole Exploit Kit (BHEK) disappeared after the arrest of “Paunch,” its author earlier in October 2013. In March of 2015 we published our report “The Evolution of...

View Article

Image may be NSFW.
Clik here to view.

The French Cybercrime Underground Economy

All crime reflects the culture that it happens in. Whether something is even a crime or not depends on the culture of where you are. What is perfectly legal in one country can be a serious crime in...

View Article


Image may be NSFW.
Clik here to view.

Encryption hides and supports a growing amount of all malware

Strong encryption can be a double-edged sword. It is obviously an essential mechanism for protecting data – e.g., payment card details, passwords, sensitive files, etc. – that is in transit across...

View Article

Image may be NSFW.
Clik here to view.

Businesses beware: New open source ransomware threatens the enterprise community

While ransomware is nothing new for the business world, there are never-before-seen infection strains popping up nearly every day. As cybersecurity experts work to bridge the gap between malicious...

View Article


Image may be NSFW.
Clik here to view.

Ransomware is a growing risk on Macs

Ransomware in particular and malware in general have long been seen by consumers, device makers and members of the cyber security community as threats that predominantly target Microsoft Windows-based...

View Article

Image may be NSFW.
Clik here to view.

BEC Scams – An Exploitation of Trust

Business Email Compromise (BEC) schemes have been growing exponentially since 2013. Since January 2015 alone, according to a June 2016 public service announcement from the FBI Internet Crime Complaint...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...

As I mentioned in a recent blog, TippingPoint celebrated its 15th birthday last month. Occasionally, I get asked if the company was named after the book The Tipping Point by Malcolm Gladwell. While we...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

New Worry-Free Services Plug-in for LabTech Sets Your Mind at Ease

I’m excited to announce our new Worry-Free Services Plug-In for LabTech. This has been a number of years in the making; and for the first time ever, it is now possible to discover, deploy, and manage...

View Article
Browsing all 527 articles
Browse latest View live