Sept. 4 (Bloomberg) -- Trend Micro's Tom Kellerman talks about computer security, hacking and cybercrime. He spoke on Aug. 30 on Bloomberg Television's "Market Makers." (Source: Bloomberg) Watch Video..
Survey scams have moved past just plaguing Facebook and Twitter users, as they have made their way to Tumblr. Luring users to find out who viewed their profiles and to earn while working from home are no longer new social engineering tactics. These still persist though. In fact, scams like these can now be considered cybercrime institutions in their own right. Read on...
The more effort authorities exert to catch up with the bad guys, the more effort cybercriminals exert to hone their malicious tools and tactics. In the end, the bad guys end up competing with their peers. Trend Micro vice president of cybersecurity, Tom Kellermann, compares and contrasts high-profile East European and East Asian hackers in the opinion piece, "Peter the Great Versus Sun Tzu" based on research made by our Forward-Looking Threat Research Team. Read on...
Social networks have become an integral part of the online experience. We've become so accustomed to social networks that we don't really hesitate to "share," "like," "tweet," or post personal details online. But have you ever really considered that every little personal detail you post online can end up in malicious individuals' hands? Read on...
As more businesses enter the social media world and create their own Facebook pages, many are unaware of the security issues that should be carefully considered. You don't want someone posting malicious apps on your business page or even profanity or inappropriate comments.
We offer some easy-to-follow tips that will help keep your Facebook business page protected from hackers and trolls.
In the early days of the Internet, most viruses spread by email. Not so anymore: you're far more likely to fall victim to malware through poisoned search results than you are from clicking on a malicious email.
Read more >
As banks and other financial institutions increase security to prevent losses resulting from phishing attacks, cyber thieves respond with a new way to automate online banking fraud—automated transfer systems (ATS).
Unlike the old tactics designed to simply steal personal information, an ATS allows cybercriminals to automatically transfer funds from victims' accounts to their own accounts without leaving a trace of their presence.
Learn more about ATS and what small businesses can do about them.
Ever wonder how cybercriminals use smartphones to steal valuable business data? See how Stan, a cybercriminal, infiltrates a corporation for industrial espionage using mobile malware. View Video (4.05)
"Far-fetched tales of West African riches strike most as comical. Our analysis suggests that is an advantage to the attacker, not a disadvantage." Read More...
Trend Micro researchers recently discovered a malicious Microsoft PowerPoint (PPT) document that arrives as a file attached to email messages. Opening the PPT file triggers a "back door" that connects to remote sites and can also leave infected systems susceptible to other, more menacing threats such as data stealing malware.