• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Malware

Ad-blocking Could Kill Malvertising, but Beware the Resourceful Cybercriminal

  • Posted on:December 16, 2015
  • Posted in:Malware, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
1

The threat landscape is notorious for its volatility. Specific threats popular with the black hats one year might be eschewed the next, for any number of reasons. Trend Micro predicts that one of the most successful infection vectors around – malvertising – might finally be on the way out in 2016 thanks to a rise…

Read More

The Evolution of PoS Attacks – More sophisticated and Targeted than Ever

  • Posted on:December 2, 2015
  • Posted in:Malware, Security, Small Business
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

According to Trend Micro Q3 2015 Security Roundup, “Hazards Ahead: Current Vulnerabilities Prelude Impending Attacks,” Point of Sale (PoS) Random Access Memory (RAM) malware targeting Small to Medium Businesses (SMBs) is on the rise. Some threat actors have now industrialized PoS RAM malware by deploying traditional mass-infection tools such as spam, botnets and exploit kits…

Read More

Fighting Ransomware with Trend Micro Security 10 and the Trend Micro Anti-Ransomware Tool

  • Posted on:November 24, 2015
  • Posted in:Consumer, Malware, Security
  • Posted by:
    Michael Miley
0

If you haven’t yet been a victim of ransomware, you’ve no doubt heard of it—and worried about how you can protect yourself from it. Ransomware—a nasty form of malware that locks your computer or encrypts your files until you pay a fee, usually by a deadline—is now more vicious than ever—with 15,000 of the 48,000…

Read More

Continued Rise in Mobile Threats for 2016

  • Posted on:November 16, 2015
  • Posted in:Android, Malware, Mobile Security, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In the Trend Micro 2016 Security Predictions report, “The Fine Line,” our CTO, Raimund Genes predicted the following: China will drive mobile malware growth to 20M by the end of 2016; globally, mobile payment methods will be attacked. Let’s discuss this and put some perspective around the information to help you understand what is happening…

Read More

The Trouble With Retail: Analyzing a Decade of Data Breaches

  • Posted on:October 28, 2015
  • Posted in:Malware, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

To the casual observer it might seem from the headlines saturating our news over the past couple of years as if data breaches happen almost exclusively at retailers. There certainly has been a spate of attacks of late, which seemed to snowball after a major incident in December 2013 when hackers stole the records of…

Read More

Defending against Crypto-Ransomware Threats

  • Posted on:September 15, 2015
  • Posted in:Business, Malware, Security, Small Business
  • Posted by:
    Richard Medugno
0

Crypto-ransomware is a growing crime problem for everyone who uses the Internet – including small businesses, of course. You’ve probably heard about this form of malware before, but as a reminder, it tricks you into downloading the ransomware onto your PC via spam with links that take you to a fake website that often looks…

Read More

How to Speed Up Your Mac without Spending a Cent

  • Posted on:April 16, 2015
  • Posted in:Malware, Security
  • Posted by:
    Trend Micro
9

1. Use Activity Monitor If you want to see what apps are using up your system, open the Activity Monitor in the Utilities folder. Activity Monitor shows all the processes on your Mac (some of which you can’t or shouldn’t close) so click on View and Windowed Processes. Now click on the CPU button and…

Read More

How to Protect Your Computer from Malware

  • Posted on:March 30, 2015
  • Posted in:Malware, Security, Social
  • Posted by:Rik Ferguson (VP, Security Research)
1

Protecting your computer and personal devices from malware requires both ongoing personal vigilance and help from professional security companies. Nowadays, malware doesn’t just target your home computers but also the mobile devices that you and your family are using. And the problem is bigger than you might think. Last year, an average 80 million malware…

Read More
Page 2 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.