Author Archives: Steven Heyde

The risks of using pagers in healthcare

5 attack scenarios and 3 tips how to avoid them

Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab

Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading

2017 Predictions: A New Year’s Resolution for Security

preds-02As we close out 2016 and prepare to ring in the New Year we must take a look back at the past 11 months before we can predict what lies ahead. In the realm of cybersecurity, that means evaluating how the threat landscape has changed to accurately assess how it will continue to evolve. Continue reading

Hybrid cloud security: it’s your responsibility!

schermafbeelding-2016-11-29-om-09-42-24The last few years, whenever VMware holds its annual user event VMworld, the concept of hybrid cloud is discussed at length. The topic is still the same but the questions have gradually shifted, from ‘how do I prepare for the hybrid cloud when it arrives?’ to ‘the hybrid cloud is already here. How do I deal with it?’. Continue reading

Dealing with ransomware in Office 365

pastedgraphic-1-kopieGoogle Docs, iWork, Office 365, … The number of organizations that has made the switch from local mail servers to a cloud-based collaboration offering, is growing at an increasing pace.

The reasons for switching are clear: no investments upfront because you pay as you add users, no personnel required for imaging your infrastructure, easier access from anywhere, … you can probably come up with some extra reasons as well. Continue reading

The French Dark Underground: the craziest products for sale

img-cover-300x210 All crime reflects the culture that it happens in. What is perfectly legal in one country can be a serious crime in another. What makes the difference, generally, is the different cultures in those counties. Cultural reflections in crime are something you see in online crime as well.

While there are some things that are universal to online crime around the globe (like malware), a lot of online crime reflects the culture just like real-world crime does. This is a theme that has emerged over the past three years in our ongoing investigations into the different countries’ markets that make up the global Cybercrime Underground Economy. We’ve just released our latest report in that series, focusing on France, a new addition to our country roster.  Continue reading

GDPR: Getting ready for 2018

eu_last1Two years after the regulation was first announced, the progress is visible but it’s slow. As often happens with regulation, it’s going to take a whipping boy to understand the gravity of the situation for most organisations. One high-profile case of a company handing money over for non-compliance under the General Data Protection Regulation (GDPR) will be the required wake-up call the rest of the industry needs to get their act together. Continue reading

Ransomware 101: What Organizations Need to Know

Ransomware 101Pick up any newspaper or log-on to your favorite tech news site today and you’re likely to come across a story about ransomware. Trend Micro alone has blocked over 100 million such threats since last October and counting.

The best way of tackling ransomware is to take preventative measures built around layered protection. But the first step we need to take is understanding the problem. So let’s take a closer look at exactly what this new malware menace is and the implications for organizations. Continue reading

Are you asking the right questions following a cyber attack?

barbed-wire-960248_960_720When discussing the numerous, ever increasing cyber attacks in the modern digital landscape, the media tends to ask the same questions: Who was this attacker and what did he want?

While these certainly seem like the important issues to face in a hacking scenario, an article from Trend Micro Senior Threat Researcher Kyle Wilhoit points out that asking these questions really doesn’t help. Sure, they may help bring the cyber criminal to justice. However, these types of questions don’t do much in terms of fixing the real problem at hand, which is that the hacked entity’s cyber security needs an upgrade. Continue reading

Panama Papers Breach: a Warning to Install Multi-Layered Security

CybercrimeUnless you’ve been living on Mars, you’ll have seen the news this week that 11.5 million documents from Panamanian law firm Mossack Fonseca have been stolen and leaked to the press. As far as data breaches go, they don’t come much bigger or more damaging than this. The whole wide world seemed to be involved. In Belgium alone, about 732 persons can be linked to 1144 financial constructions in eleven different tax havens, via the Panamese law firm Mossack Fonseca. Many of these Belgians are CEOs, financial managers, and/or public figures.

Without wanting to comment on the content of those documents, there’s a clear security lesson to be learned.

Continue reading