Skip to content

Threat Reports and Security Predictions

open all

TrendLabs 1Q 2014 Security Roundup: Cybercrime Hits the Unexpected

 

Targeted Attack Trends: 2H 2013 Report

TrendLabs 2013 Annual Security Roundup: Cashing in on Digital Information

Good old-fashioned stick-’em-up bank heists have seemingly been pushed to the curb by digital heists in 2013.

Cybercriminals who used sophisticated techniques to get hold of credit card numbers, bank accounts, and even personally identifiable information (PII) in a matter of minutes have taken the place of traditional thieves. Information is, after all, the new currency. And with it on hand, cybercriminals can hold victims at their mercy, which should make us all realize that we stand to lose more than we think.

the Web version of the Security Roundup
Download the full report

Blurring Boundaries: Trend Micro Predictions for 2014 and Beyond

Cybercriminals and attackers will use mobile devices as well as reliable exploits to gain entry to systems. While “wearable” technologies start to gain traction, attacks to these technologies/devices will be minimal and will only be for research. Businesses and end-users alike will have to battle threats to mobile banking, as well as ensuring that their online privacy is intact.

View the Web version of the 2014 Security Predictions
Download the full report

TrendLabs 3Q 2013 Security Roundup: The Invisible Web Unmasked

News about cybercrime circulated in recent months. The takedown of Liberty Reserve, an illegal digital currency system, and the recent seizure of the online black market, Silk Road, were among the many incidents this quarter that triggered greater public awareness of online threats. The arrest of the alleged Blackhole Exploit Kit creator in October also proved that cybercrime is indeed a business that thrives right under our noses.

View the Web version of the Security Roundup
Download the full report

TrendLabs 2Q 2013 Security Roundup: Mobile Threats Go Full Throttle

Device Flaws Lead to Risky Trail

The TrendLabs 2012 Annual Security Roundup showed that the past year ushered in the post-PC era as cybercriminals embraced mobile malware use. Mobile malware remained a big problem for users this quarter though the main concern went beyond their sheer number. The discovery of OBAD malware and the “master key” vulnerability highlighted cybercriminals’ ability to find ways to exploit flaws in the Android™ ecosystem. We noted that these incidents were designed to bypass security measures and serve as other means for cybercriminals to gain control over devices.

See the web version of the TrendLabs 2Q 2013 Security Roundup
Download the full report

 

TrendLabs 1Q 2013 Security Roundup: Zero-Days Hit Users Hard at the Start of the Year

 

TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World

 

TrendLabs 2012 Mobile Threat and Security Roundup: Repeating History

 

3Q 2012 Security Roundup: Android Under Siege: Popularity Comes at a Price

 

2Q 2012 Security Roundup: It's Big Business... and It's Getting Personal

 

1Q 2012 Security Roundup: Security in the Age of Mobility

 

A Look Back at 2011: Information Is Currency

 

More in Threat Reports

open all

 

Analysis of the Australian and New Zealand Web Threat Landscape.

 

Analysis of the Australian Web Threat Landscape

 

Windows 8 and Windows RT: New Beginnings

 

Safe: A Targeted Threat

 

Latin American and Caribbean Cybersecurity Trends and Government Responses /

Tendencias en la seguridad cibernética en América Latina y el Caribe y respuestas de los gobiernos

 

SCADA in the Cloud: A Security Conundrum?

 

Africa: A New Safe Harbor for Cybercriminals?

 

Who's Really Attacking Your ICS Equipment?

 

Asprox Reborn

 

FAKEM RAT: Malware Disguised as Windows Messenger and Yahoo! Messenger

 

The HeartBeat APT Campaign

 

The Crimeware Evolution

 

Spear-Phishing Email: Most Favored APT Attack Bait

 

Police Ransomware Update

 

Russian Underground 101

 

Detecting APT Activity with Network Traffic Analysis

 

W32.Tinba (Tinybanker): The Turkish Incident

 

Adding Android and Mac OS X Malware to the APT Toolbox

 

Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs—An In-Depth Analysis

 

Operation Ghost Click: The Rove Digital Takedown

 

Automating Online Banking Fraud—Automatic Transfer System: The Latest Cybercrime Toolkit Feature

 

IXESHE: An APT Campaign

 

Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan

 

The "Police Trojan": An In-Depth Analysis

 

Trends in Targeted Attacks

 

More in Research Papers

open all

 

CSO Reviews Deep Discovery Inspector

 

Malicious Network Communications: What Are You Overlooking?

 

5 Predictions for 2013 and Beyond: What Should SMBs Look Out For?

 

Security Threats to Business, the Digital Lifestyle, and the Cloud: Trend Micro Predictions for 2013 and Beyond

 

Eco and Ego Apps in Japan

 

The Knight Fork: Defining Defense in 2013

 

Peter the Great vs Sun Tzu

 

How to Thwart the Digital Insider – An Advanced Persistent Response to Targeted Attacks

 

How Tough Is It to Deal With APTs?

 

12 Security Predictions for 2012

 

Malicious Redirection: A Look at DNS Changers

 

More in Spotlight Articles


Connect with us on