Banking malware steals money, but ransomware removes your past

For years hackers have been stealing documents from your machines. No matter what… hackers will always find a way to get in. But once they get in, their problems start: how to monetize the hacked device? Of course passwords, credit card and banking details are relatively easy to monetize.

Continue reading

Fake news for sale

A ground-breaking new study from Trend Micro has revealed for the first time the size and maturity of the online fake news business, where a 12-month campaign to influence the result of an election could cost as little as €357.700.

The comprehensive 77-page report breaks down the key steps used to influence public opinion: from reconnaissance of the target audience and weaponisation – preparation of the fake story – to delivery and exploitation via social media, and sustainment with additional propaganda.  Continue reading

Trend Micro Wins VMware Global Partner Innovation Award

Recently, we were honored to receive the VMware 2016 Global Partner Innovation Award in the Technical ISV category at the VMware Partner Leadership Summit 2017, held in Ranchos Palos Verdes, Calif. Recipients of a Global VMware Partner Innovation Award were acknowledged in 21 categories for outstanding performance and distinctive achievements during 2016.  Continue reading

Randstad Group Selects Trend Micro to Protect its Public Cloud Infrastructure

The Randstad Group is currently in the process of consolidating and centralizing its IT infrastructure across 30 IT departments, and will be providing service to more than 40 operating countries across four continents. To ensure the new infrastructure will have optimal security the company selected Trend Micro as its cloud security solution partner for the next five years.  Continue reading

Robert McArdle speaker at the Heliview Cyber Security conference

Hell Yeah! Robert McArdle is visiting Belgium again. After his presentation at infosecurity.be (March), he now is a keynote speaker at the second Cyber Security conference organised by Heliview.

As EMEA manager within the Forward-looking Threat Research (FTR) team, he is involved in analysing the latest malware threats, specialising in researching the future threat landscape, criminal underground and coordinating investigations with international law enforcement.  Continue reading

Is Wannacry a general rehearsal for a much bigger attack?

The Wannacry ransomware has been keeping us busy for several days now. This software has infected systems worldwide by exploiting an older (already patched) Windows vulnerability. Though many may wonder how a vulnerability that has been patched can still infect so many systems worldwide, it appears that the attack hasn’t brought in much money yet. Considering the attack and the errors made by the criminals, I wonder if this attack hasn’t been a first test or a general rehearsal for a much bigger attack.  Continue reading

The Dark Web: what’s beneath the tip of the iceberg?

Have you ever thought of the internet as an iceberg? There are some good reasons to do so. What we can see is only a minor part of the total internet. Underneath is an invisible part, which forms the majority of the internet sites worldwide. We call this invisible part the ‘deep web’, with part of it being the ’dark web’. Deep and dark, like… the underwater part of an iceberg, indeed. Continue reading

Pawn Storm: Back with a Vengeance to Target French Presidential Hopeful Macron

Blog by Ross Dyer, Technical Director at Trend Micro

Thought you’d seen the last of prolific hacking group Pawn Storm? Think again. Just-published research from Trend Micro reveals fascinating new insights into one of the world’s longest-running cyber espionage groups. As politicians in the US continue to argue over the impact of its audacious campaign against Democratic Party officials last year, Pawn Storm is at it again, attempting to influence public option ahead of major elections in France and Germany. Continue reading

Worry-Free Services, powered by XGen Security

 According to a recent committee hearing by the House Small Business Committee, nearly 60 percent of small companies go out of business within six months following a hack and 71 percent of all cyber assaults occur at businesses with under 100 workers.  Our own data at Trend Micro indicates that small businesses are not immune from cyberattacks. In fact, small businesses are generally regarded as being more susceptible to attacks due to lack of dedicated security personnel and minimal investment in security software and hardware. Continue reading

Stolen Memories: Why cyber thieves attack personal over financial data

In the never-ending war against cybercrime, half the battle lies in raising public awareness about the nature of the threats out there. If everyday computers users are more clued into the security and privacy dangers facing them online, they’re more likely to take steps to reduce risk. But there’s always more to learn – that’s the problem when you’re faced with a fast-moving industry like cybercrime. Continue reading