Ever since the law enforcement takedown of the Silk Road underground marketplace in 2013, there has been increasing interest in the depth and breadth of the Dark Web. This portion of the internet has been largely shrouded from the public eye. But it represents an environment in which hackers can converse or share malicious code and strategies. And make a profit from the information stolen during the ever-increasing cyber attacks taking place.
As the Internet of Things (IoT) permeates further into our lives, the potential for hackers to line their pockets or disrupt critical infrastructure moves increasingly from theory to practice. For those IT and business leaders looking for more guidance, check out our CLOUDSEC conference next week, 5 September. Continue reading
Security researchers from TrendLabs discovered ANDROIDOS_GHOSTCTRL.OPS / ANDROIDOS_GHOSTCTRL.OPSA and named this Android backdoor GhostCtrl as it can stealthily control many of the infected device’s functionalities. Continue reading
Mobile malware is still growing significantly: the number of unique samples of malware has been growing almost continuously throughout the year. By the end of 2016, over 19 million unique samples of malicious Android apps had been collected and analyzed, almost twice as much as in 2015. The number and diversity of mobile threats increases along with the number of devices and the advances in technologie that power these mobile devices. That is the most important conclusion from Trend Micro’s Mobile Threat Landscape Report. Continue reading