IT Brief Australia logo
Technology news for Australia's largest enterprises

Trend Micro news stories - Page 7

Story image
Malware
Australia a hot target for BEC scams, malicious URLs and malware
More than a quarter of all business email compromise (BEC) scams around the world target Australia, new research says.
Story image
Malware
EMOTET banking malware returns with a wider scope & vengeance
The EMOTET banking malware has emerged with a wider target scope than ever before, three years after it was originally found.
Story image
GDPR
Trend Micro says C-level executives are not prepared for GDPR
The company refers to a survey they conducted that shows some organisations need to be better prepared for when the scheme is implemented.
Story image
Trend Micro
Draw your way to $14,000 in the What’s Your Story? poster competition
Techday is proud to be supporting the What’s Your Story? poster competition...
Story image
Trend Micro
Fileless malware sneaks into Windows machines via USB flash drives
A malicious backdoor called BKDR-ANDROM.ETIN is using fileless malware to infect systems through USB flash drives.
Story image
Smartphone
$500,000 zero-day prize pool for Mobile Pwn2Own contest in Japan
Trend Micro has put more than US$500,000 towards a prize pool that aims to find security vulnerabilities at the upcoming Mobile Pwn2Own contest.
Story image
Digital Transformation
Trend Micro announces partnership with VMware Cloud on AWS
​Trend Micro has announced its server security product is now available to customers of VMware Cloud on Amazon Web Services (AWS).
Story image
Smart Home
Parents, combat cyberbullying with Trend Micro’s Home Network Security
“Parents can now protect their children against dangers such as cyberbullying and online predators..."
Story image
Malware
Hands-on review: Trend Micro’s Home Network Security simplifies how we get protected from cyber attacks
Protecting your devices from cyber attacks has never been this easy.
Story image
Smart Home
Time for kids to go outside and smell the roses: How to limit screen time in a connected world
Children have countless options on how they connect to the internet, so how do parents limit screen-time?
Story image
Phishing
How to make your smart home safe when hackers are looming nearby
The more devices you connect to your network the more you need to protect, your data may be at risk...
Story image
Google
GhostClicker adware infiltrated 300 apps on Google Play
A pervasive auto-clicking adware by the name of GhostClicker has infected as many as 340 apps from Google Play.
Story image
Phishing
How your online dating profile can be traced back to your workplace
Online dating apps can go beyond the world of personal matchmaking and be used at weapons for cyber attacks against corporate organisations.
Story image
Malware
New report details exploits of notorious cyberespionage group with EMEA targets
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Story image
Malware
New version of SambaCry spotted in the wild: Linux users urged to update OS
Trend Micro researchers have discovered a newer version of the SambaCry malware, named ELF-SHELLBIND.A.
Story image
Trend Micro
Trend Micro & VMware tie the knot around mobile threat management
Trend Micro has joined VMware’s Mobile Security Alliance this week, as the companies seek to tackle the growing number of mobile security threats.
Story image
Trend Micro
Trend Micro launches US$100 million venture fund to harness the IoT wave
Trend Micro’s venture will offer companies financial backing, access to its world-class global threat intelligence, and strategic alliances.
Story image
Cybercrime
War of the words: How cybercriminals are selling fake news through the underground
"Monetary outcomes of fake news come both from advertising and the reaction – like fake news supporting donations to a cause."
Story image
Internet of Things
Trend Micro's ten steps for securing our smart cities
Right now there are 250 smart city projects underway in 178 cities worldwide, but how do those projects tackle cybersecurity?
Story image
Cybercrime
The need for internet security on your mobile
As hackers target mobile devices, it’s imperative to ensure that you are aware of the threats that are out there, and that your phone is protected.
Story image
Cybersecurity
The need for internet security on your devices
At home or at work, on a mobile device or on a network, Trend Micro covers all aspects of cybersecurity.
Story image
Ransomware
What makes Locky and Cerber ransomware so good - and what about CradleCore?
Locky, Cerber and... CradleCore? What makes these three ransomware strains so pervasive?
Story image
Ransomware
What makes the Cerber ransomware so agile?
The Cerber ransomware has been one of the most nimble, varied and dominant malware strains on the market — almost neck-and-neck with Locky.
Story image
Trend Micro
INTERPOL & private sector uncover thousands of threats across ASEAN
INTERPOL has found 8800 Command and Control (C2) servers and hundreds of compromised websites, including government portals across Asia.