This research paper provides a closer look into China’s bustling cybercriminal underground—including new market offerings like leaked data search engines and carding devices.
The security threat landscape was filled with a lot of big, notable incidents this year, but that doesn't mean we can't be thankful for other developments this Thanksgiving. Here are five things we're grateful for this year.
End-to-end encryption email service ProtonMail learned a costly lesson about cyber ransom tactics: just because hackers demanded a ransom, it doesn’t mean the attacks are going to stop once you pay up.
From new extortion schemes and IoT threats to improved cybercrime legislation, Trend Micro predicts how the security landscape is going to look like in 2016.
This research paper offers a glimpse into Japan's unique cybercriminal underground—it's economy, the cybercriminals' activities, and a marketplace characterized by the taboo, the illegal, and the vindictive.
From traditional credit cards to next-gen payment processing technologies such as EMV cards and mobile wallets, here's a look at how they work, as well as their advantages and disadvantages.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.
Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.
While not done for profit, hacktivism has forced companies and organizations to face critical security challenges. Find out what it is and how it evolved from being the “Internet’s voice” to one of today's biggest security threats.