Everyone knows about bots being described as a horde of zombies. But what about the other common threats? We dressed them up some in Halloween costumes to give them a festive face.
From new extortion schemes and IoT threats to improved cybercrime legislation, Trend Micro predicts how the security landscape is going to look like in 2016.
As merchants in the US adapt the new EMV payment system, should we expect to see less fraud cases? Could it have prevented the notorious Target breach of 2013?
Earlier this year, an Android vulnerability called Stagefright was discovered that can be exploited through MMS messages. A successor been discovered that uses the web browser to infect devices.
Find out what Trend Micro researchers have to say and where they stand on current issues, trending topics, the status of cyber security today, and the threat landscape of tomorrow.
More iOS security holes found? Shortly after the XcodeGhost malware issue, a new malware dubbed YiSpecter has been discovered spreading to iOS devices through the App Store.
From traditional credit cards to next-gen payment processing technologies such as EMV cards and mobile wallets, here's a look at how they work, as well as their advantages and disadvantages.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.