Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

October 2016 – A brave new world of security updates

Welcome to the first Trend Micro Zero Day Initiative (ZDI) monthly patch review blog. This month, we put additional context around the major security patches released from Microsoft and Adobe. As the...

View Article


Image may be NSFW.
Clik here to view.

Exploits as a Service: How the Exploit Kit + Ransomware Tandem Affects a...

Blackhole Exploit Kit introduced the lucrative but hazardous exploit-kit-ransomware combo with CryptoLocker back in 2013. Soon after, other exploit kits, like Angler, Neutrino, Magnitude, and Rig,...

View Article


Image may be NSFW.
Clik here to view.

Trend Micro’s Latest Legal Victory is a Win for the Real Innovators

At Trend Micro we’ve been protecting businesses, consumers and governments from cyber threats for more than 27 years now. Our success over this time has been built on our passion to make the world...

View Article

Image may be NSFW.
Clik here to view.

Talking about Ransomware, A Recap

Our recent #trendsider twitter chat focused on ransomware. If you haven’t heard about ransomware yet, the odds are good that you will soon. This is major growth area for cybercriminals. Ransomware...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 10,...

I was in Miami, Florida this week meeting with our TippingPoint sales team. We stayed at a property that is owned by a certain U.S. presidential candidate. On our last night there, we get back from...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro Achieves “Recommended” Status from NSS Labs Testing

Once again, we at Trend Micro have proven ourselves to be worthy opponents amongst our competitors in the realm of security and network defense. Our latest victory shines the spotlight on Trend Micro...

View Article

Image may be NSFW.
Clik here to view.

Raising the bar with XGen™ Endpoint Security – Protection Exactly When and...

IT security managers are faced with a series of challenges: increasingly sophisticated threats, riskier user behavior and a lack of visibility across their different security systems. At Trend Micro,...

View Article


Image may be NSFW.
Clik here to view.

Trend Micro Endpoint Security Named A Leader in New Forrester Report

Ransomware, targeted attacks, zero day threats, information stealing malware – modern CISOs face a formidable array of threats today. Just last month the FBI was forced to issue yet another warning on...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 17,...

Our Zero Day Initiative team is really busy this time of the year. In addition to their participation at the upcoming Ruxcon conference, they will also be hosting the 2016 Mobile Pwn2Own competition at...

View Article

Image may be NSFW.
Clik here to view.

Use of Pagers in ICS Pose Challenges

In a follow-on report to our recent one involving the use of pagers in healthcare, Trend Micro Forward-Looking Research (FTR) team also analyzed the use of pager communications in industrial...

View Article

Image may be NSFW.
Clik here to view.

6 Scariest Faces of Ransomware

This time of year is full of thrills and chills, but no online threat is quite as scary as ransomware. While it comes in many forms, the overall gist is that ransomware locks files on a computer and...

View Article


Image may be NSFW.
Clik here to view.

Welcome to Mobile Pwn2Own 2016

Greetings from Tokyo where the 2016 Mobile Pwn2Own competition has begun! For this year’s edition, two separate contestants registered to target five specific targets through the day. We’ve also chosen...

View Article

Image may be NSFW.
Clik here to view.

Risk and Reward of Alternative Payment Systems

The explosive growth of alternative payment systems (APS) globally has posed great opportunities for businesses and consumers alike but equally has posed significant challenges for international law...

View Article


The Results are In: Mobile Pwn2Own 2016

The 2016 edition of Mobile Pwn2Own has wrapped, and the contestants demonstrated some unique attacks against the iPhone 6S and Nexus 6P. By the end of the day, researchers showed how phones – even...

View Article

TippingPoint DVLabs Provides Exclusive Security Coverage for Mobile Pwn2Own...

Welcome back to Mobile Pwn2Own 2016, from the PacSecWest security conference in Tokyo, Japan!  This year’s contest featured two competitor teams; Tencent Keen Security Lab and MWR Labs.  Ultimately,...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 24,...

Earlier this week, the Zero Day Initiative (ZDI) hosted the 2016 Mobile Pwn2Own contest in Tokyo during the PacSec conference. This year’s contest saw unique attacks against the iPhone 6S and Nexus 6P....

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

Evolution of Securing VMware Environments

Trend Micro has a long history of providing organizations with advanced server security for physical, virtual, and cloud environments. We protect enterprise applications and data from ransomware,...

View Article
Browsing all 527 articles
Browse latest View live