Please turn on your JavaScript for this page to function normally.
earth
Inside the Middle Eastern and North African cybercriminal underground

Trend Micro researchers investigated the Middle Eastern and North African cybercriminal underground, and found that prices for malware and hacking tools are generally a bit …

ATM
ATM hackers switch to network-based attacks

More and more attacks against ATMs are network-based, Trend Micro researchers have found. Since the discovery of the first ATM malware back in 2009, criminals have …

GDPR
GDPR awareness: 1 in 5 businesses claim a fine wouldn’t bother them

With the General Data Protection Regulation (GDPR) taking effect May 25, 2018, businesses around the globe should be preparing accordingly. However, through a recent survey, …

IoT world
US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch …

bitcoin
New Cerber ransomware variant steals Bitcoin wallets, passwords

Here’s a new reason to fear ransomware more than ever before: a new variant of Cerber has been modified to steal Bitcoin wallets and passwords before encrypting …

tunnel
The anatomy of a completely fileless attack

The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals. Trend Micro researchers, though, are keen to …

SambaCry
Attackers are taking over NAS devices via SambaCry flaw

A Samba remote code execution flaw patched in May is being exploited to compromise IoT devices running on different architectures (MIPS, ARM, PowerPC, etc.), Trend Micro …

fake news
Fake news services and tools proliferate on online markets

Fake news is not a new concept, but the Internet – and social media and networks in particular – have made it infinitely easier for it to spread and reach its …

storm
Attacks within the Dark Web

For six months, Trend Micro researchers operated a honeypot setup simulating several underground services on the Dark Web. The goal of their research was to see if those …

city
What will it take to keep smart cities safe?

“Smart cities” use smart technologies in their critical infrastructure sectors: energy, transportation, environment, communications, and government. This includes …

industry
SCADA systems plagued by insecure development and slow patching

“Behind most modern conveniences, there exists a SCADA system somewhere that controls them,” Trend Micro researchers pointed out in a new report that delves in the …

industrial robot
Hacking industrial robots in today’s smart factories

It has been estimated that by 2018, approximately 1.3 million industrial robot units – mechanical multi-axis “arms” used for automating various operations – will …

Don't miss

Cybersecurity news