Tag: Trend Micro

Man and robotic machine work together inside industrial building. The mechanical arm performs welds on metal components assisted by a worker who in turn manages welds manually.

Researchers Find Security Risks Relating to Industrial Machinery

The attack surface that security professionals must defend grows exponentially as more and more of our workplaces and processes are automated. This is especially true in industrial settings, where a host of machinery engages in a tightly coordinated dance, directed through instructions sent over wired or wireless networks. The price for a security breach is […]

Unraveling the code

Federal Jury Convicts Cybercriminal for Operating Counter-Antivirus Service

Over the past few years, the ubiquity of cryptocurrency has made cybercrime easier to monetize. The promise of a quick buck has attracted would-be cybercriminals who lack the traditional skill set required to engage in anything beyond a low-level hack. Much like their aboveboard capitalist counterparts, black market entrepreneurs have stepped in to fill that […]

Cell phone security

Cryptocurrency Miner Disguises Itself as a Legitimate Google Play Update

As cryptocurrency values continues to trend upward, threat actors looking to cash in are exploiting every avenue they can. This includes mimicking updates pushed by the operating system (OS) to help protect the device. A new cryptocurrency miner called HiddenMiner is now using this method to infect older Android phones running pre-Nougat (Android 7.0) versions […]

Cybersecurity News You May Have Missed

There’s always something new going on in the world of cybersecurity! We’ve rounded up a few items that you may have missed in the past couple of weeks, from spyware invading apps to new car hacks to FBI recommendations for private businesses.

Rendering Phishers’ Hooks Ineffective

By Ryan Francis Ransomware gets most of the cybersecurity attention these days, but it’s delivered via a method almost as old as cybercrime itself—phishing. Phishing is still the number one vehicle used by cybercriminals looking to infect your company’s network, and its power can be taken away by vigilant end users.