Trend Micro, a global leader in security software and solutions, recently partnered with Interpol in the arrest of the head of an international criminal network suspected of stealing more than $60 million through business email compromise (BEC)
Cyber attackers are now bolder, smarter and more daring in attack vectors, cyberespionage efforts and cyber underground activity on a global basis, Trend Micro said in its annual security roundup report.
“Our observations fo
Cybercriminals became more inventive in their attacks during the second quarter of 2015 to infiltrate and abuse existing technologies that are often overlooked, a Trend Micro report said, highlighting targeted attacks to public utilities.
Highly specific applications, programs, operating systems, and setups did not prevent threat actors from launching effective attacks in 2014, according to a report.
Trend Micro, a global leader in security software, has revealed t
Trend Micro, a leader in security software, is showcasing its solutions to support customers in their defence against targeted attacks at the ongoing RSA Conference, a global IT security event in the US city of San Francisco.
Targeted cyber attacks will become rampant in the Middle East, as hackers from the usual suspects have found success targeting victims around the world, a report said.
The annual security predictions report “Trend Micro Secu
Smart cities must design utilities systems with custom defence solutions that protect smart meters and smart grids from cyber-attacks such as home tampering and utilities hacking, a report said.
While wearable personal technology
Cybercriminals have been continuously discovering more and more ways to successfully target new outlets for financial theft, according to a new report.
Greed is motivating cybercriminals to take a non-traditional approach in the s
Trend Micro, the global leader in small business content security, has announced upgrades to Trend Micro Worry- Free Business Security, with version 9.0 to equip small businesses with enterprise-grade security capabilities.
Watering hole attacks, clickjacking and mobile threats will loom large in 2014, with cyber criminals increasingly using targeted attack methodologies in their campaigns and hiding themselves in the Deep Web, according to Trend Micro.