Please turn on your JavaScript for this page to function normally.
online gaming
Trade of online gaming currencies fuels cybercrime

Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro …

Android malware
DressCode Android malware found in 3,000 apps

When Check Point researchers unearthed more than 40 apps on Google Play (and 400 on third party app stores) infected with the so-called DressCode malware in late October, it …

Lock keyboard
HDDCryptor ransomware uses open source tools to thoroughly own systems

HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and …

biohazard
The evolution of BEC scams and ransomware

Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent …

Eduardo Cabrera, Chief Cybersecurity Officer at Trend Micro
CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro

Eduardo Cabrera is the Chief Cybersecurity Officer at Trend Micro, responsible for analyzing emerging cyber threats to develop enterprise risk management strategies. Before …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

Ransomware targets Android smart TVs

If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both …

professional
BEC scams: What you need to know

Ransomware attacks hitting businesses and institutions might be the latest trend, but they are just one of the threats these organizations have to protect themselves against. …

rings
FastPOS malware exfiltrates data immediately after harvesting it

POS malware might have taken a backseat when ransomware became the go-to malware for many cyber crooks, but stealing payment card information to effect fraudulent transactions …

ransomware
The many faces and tactics of Jigsaw crypto-ransomware

The Jigsaw crypto-ransomware got its name from the main bad guy from the popular horror movie franchise Saw, as its initial ransom note (either in English or Portuguese) shows …

end of support
Uninstall QuickTime for Windows today!

The time has come to deinstall QuickTime from your Windows machine. Trend Micro’s Zero Day Initiative has just released advisories (ZDI-16-241 and ZDI-16-242) detailing …

Businessman
Take it to the boardroom: Elevating the cybersecurity discussion

As data breaches continue to rise, organizations, regardless of their size or industry they are in, must take into consideration a new mindset. Despite the FBI’s focus on …

Don't miss

Cybersecurity news