It should not come as a surprise that company executives (particularly the CEO and President) and other revered high-level employees get to be impersonated often for criminal reasons. How can you say no when it’s the CEO asking? How can you not comply when it’s already the President specifically requesting? Gone are the days of the telltale signs of an email scam: glaring grammatical errors and outlandish stories about lottery winnings or royalty riches. Today, Business Email Compromise (BEC) scammers use this regard of authority to target internal employees who may deal with and handle the finance of the company: the Chief Financial Officers (CFOs). Continue reading
Today we are joining hundreds of IT and security specialists in Brussels Expo for the annual Infosecurity fair. In the light of this event Albert Kramer (Technical Director Trend Micro Continental Europe) wrote an opinion article on a bold comparison: terrorists are like journalists. Continue reading
Pick up any newspaper or log-on to your favorite tech news site today and you’re likely to come across a story about ransomware. Trend Micro alone has blocked over 100 million such threats since last October and counting.
The best way of tackling ransomware is to take preventative measures built around layered protection. But the first step we need to take is understanding the problem. So let’s take a closer look at exactly what this new malware menace is and the implications for organizations. Continue reading
There is no industry that hackers won’t target as long as they have something to gain from it. All and any personally identifiable information has some value to someone on the Dark Web, whether it will be used for identity theft purposes, for an advanced targeted attack or for something else. Cyber criminals work tirelessly to breach systems in a variety of verticals, and it shows: In 2015, the Identity Theft Resource Center in the US tallied over 780 data breaches, amounting to the exposure of more than 169 million records. Continue reading