From new extortion schemes and IoT threats to improved cybercrime legislation, Trend Micro predicts how the security landscape is going to look like in 2016.
Find out what Trend Micro researchers have to say and where they stand on current issues, trending topics, the status of cyber security today, and the threat landscape of tomorrow.
Details from the TorrentLocker infections seen in the first half of 2015, including common evasion techniques and solutions that can be used to defend against the threat.
Watch what happens during a ransomware infection, from the time a user receives the email with the spiked attachment to the time the malware itself is executed.
Spam with messages that contain an "attached resume" is being used to spread Cryptowall 3.0, a ransomware variant that uses RSA encryption to lock down its victims' files.
It's been around a decade since we've been introduced to ransomware. Let's take a stroll down memory lane to see how it has evolved through some of the notable cases we've tackled through the years.
The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.