News & Commentaries >

  1. Ransomware has consistently been in the spotlight since attacks first began emerging a few years ago. Now that new and powerful samples like WannaCry are being used to infiltrate large-scale organizations, ransomware […]

    Ransomware Updates: Newest Threats, Protection Best Practices

    Ransomware has consistently been in the spotlight since attacks first began emerging a few years ago. Now that new and powerful samples like WannaCry are being used to infiltrate large-scale organizations, ransomware […]
  2. In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we […]

    Grading our Predictions: See how we fared in 1H 2017

    In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we […]
  3. As much as smartphones and applications have evolved over the years, so has mobile malware. We’re seeing an increasing number of threats—from mobile ransomware and auto-clicking adwareto dangerous backdoors that can compromise your privacy. […]

    An Established Solution for Mobile Threats

    As much as smartphones and applications have evolved over the years, so has mobile malware. We’re seeing an increasing number of threats—from mobile ransomware and auto-clicking adwareto dangerous backdoors that can compromise your privacy. […]
  4. If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s […]

    Smartphones Under Fire: Why We Need to Keep Our Android Devices Safe

    If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s […]
  5. Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion people […]

    How hackers have improved their BEC attack methods

    Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion people […]
  6. •Senior executives shun GDPR responsibility in 57 percent of businesses •42 percent of businesses don’t know email marketing databases contain PII •22 percent of businesses claim a fine ‘wouldn’t bother […]

    Trend Micro Research Reveals C-level Executives Are Not Prepared for GDPR Implementation

    •Senior executives shun GDPR responsibility in 57 percent of businesses •42 percent of businesses don’t know email marketing databases contain PII •22 percent of businesses claim a fine ‘wouldn’t bother […]

VIDEOS >