Everyone knows about bots being described as a horde of zombies. But what about the other common threats? We dressed them up some in Halloween costumes to give them a festive face.
From new extortion schemes and IoT threats to improved cybercrime legislation, Trend Micro predicts how the security landscape is going to look like in 2016.
Find out what Trend Micro researchers have to say and where they stand on current issues, trending topics, the status of cyber security today, and the threat landscape of tomorrow.
Details from the TorrentLocker infections seen in the first half of 2015, including common evasion techniques and solutions that can be used to defend against the threat.
Watch what happens during a ransomware infection, from the time a user receives the email with the spiked attachment to the time the malware itself is executed.
Spam with messages that contain an "attached resume" is being used to spread Cryptowall 3.0, a ransomware variant that uses RSA encryption to lock down its victims' files.
It's been around a decade since we've been introduced to ransomware. Let's take a stroll down memory lane to see how it has evolved through some of the notable cases we've tackled through the years.