News
Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?
June 14, 2018
Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware.
Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked
June 11, 2018
When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it’s been cryptojacked and becomes a coinmining zombie.
SMiShing Attacks Leverage Punycode Technique
June 5, 2018
We discovered a malware family called Maikspy — a multi-platform spyware that can steal users’ private data.
FBI Router Reboot Warning: How Do I Stay Safe from the New VPNFilter Malware?
June 4, 2018
You might have seen reports that the FBI is warning home users of a new foreign cyber-attack campaign targeted at your routers and network-attached storage (NAS) devices.
Windows Home User Test Report Shows 100% Protection Result and Top Product Award
June 4, 2018
Maintaining its Top Product protection rating, Trend Micro Internet Security 12.0 (2018) continues to show 100% Protection results in tests conducted by AV-TEST.org.
Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale
May 31, 2018
Cellular network technologies such as 3G and 4G allow fast wireless communication. But the next evolution, 5G, is set to afford even faster connections along with greater reliability.
Android Devices Found Preinstalled With Adware Cosiloon
May 29, 2018
Researchers reported that over a hundred Android devices had been preinstalled with the adware Cosiloon, affecting more than 18,000 gadgets in more than 100 countries.
Monero-Mining Malware Targets Mac Users
May 29, 2018
A persistent Monero-miner malware increases CPU activity and drains the batteries of Mac users, making the hardware prone to system slowdown and overheating.
The Anatomy of a Scam: Fake IRS Messages
May 24, 2018
In many ways, online “phishing” scams have hardly changed since the early 1990’s, when attackers would “fish” for account information of people using American Online.