• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2015

Macro Threats and Ransomware Make Their Mark: A Midyear Look at the Email Landscape

  • Posted on:August 31, 2015 at 1:14 pm
  • Posted in:Ransomware, Spam
  • Author:
    Maydalene Salvador (Anti-spam Research Engineer)
0

Email can be considered a big business—for cybercrime. In 2014, 196.3 billion emails were sent and received daily. Of that number, 108.7 billion were business emails. With the volume of business emails sent daily, it would be unimaginable for cybercriminals not to take advantage of email to target big businesses. And those attempts can result in million-dollar…

Read More
Tags: 1H 2015 spam roundupemailemail roundupmacroSpamspam roundup

Blackmail, Deletion Offers Hit Ashley Madison Users

  • Posted on:August 31, 2015 at 2:13 am
  • Posted in:Social
  • Author:
    Jonathan Leopando (Technical Communications)
0

How much is keeping a secret worth? According to hackers taking advantage of the Ashley Madison hack, it’s worth only up to one Bitcoin – around 230 US dollars at current exchange rates. Soon after the data from the breach was leaked to the public, we knew that there would be some sort of other…

Read More

Targeted Attacks: Not All Attacks Need To Be Sophisticated

  • Posted on:August 27, 2015 at 8:05 pm
  • Posted in:CTO Insights, Targeted Attacks
  • Author:Raimund Genes (Chief Technology Officer)
0

The security industry loves to talk about how “sophisticated” attacks can be. Usually this takes the form of us saying how advanced and sophisticated an attack is, what new methods were used to hide servers or make analysis harder, etcetera. However, it’s easy to forget that not all attacks need to be technically sophisticated; instead…

Read More

FTC Has Authority to Enforce Corporate Cybersecurity

  • Posted on:August 27, 2015 at 12:31 pm
  • Posted in:Bad Sites
  • Author:Tom Kellermann
0

Up to now, there have been relatively few laws or regulations from government agencies that mandate just how companies should protect their data. In the United States, however, that may be about to change. Earlier this week, the United States Court of Appeals for the Third Circuit decided in FTC v. Wyndham Worldwide Corp. that the…

Read More

FuTuRology: Watch Out for Literally Crippling Healthcare Technologies

  • Posted on:August 26, 2015 at 11:46 pm
  • Posted in:Internet of Things
  • Author:
    David Sancho (Senior Threat Researcher)
0

We’re back to look inside the crystal ball of future technologies. This is the third post of the “FuTuRology” project, a blog series where the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of popular technologies. In the last two installments of this series, we introduced our future technology threat landscape project and started to…

Read More
Tags: futurologyhealthcare
Page 1 of 512 › »

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • February Patch Tuesday: Batch Includes 77 Updates That Cover Flaws in Internet Explorer, Exchange Server, and DHCP Server
  • Going In-depth with Emotet: Multilayer Operating Mechanisms
  • Various Google Play ‘Beauty Camera’ Apps Send Users Pornographic Content, Redirect Them to Phishing Websites and Collect Their Pictures
  • Linux Coin Miner Copied Scripts From KORKERDS, Removes All Other Malware and Miners
  • Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.