The Latest in IT Security

Posts Tagged ‘Pleasejoin Trend Micro’

Researchers have uncovered a cybercriminal ring that uses an interesting method to launder their criminal proceeds. The fraudsters monitored by Trend Micro sometimes rely on the classic method of sending money to unwitting mules and instructing them to wire it via services such as Western Union.

Read more ...

The name of Nelson Mandela has often been leveraged in scams. Trend Micro provides a couple of examples: one sample that was doing the rounds before Mandela died, and one that started landing in inboxes after his death. The email that was doing the rounds in November was entitled Celebrate with u…

Read more ...

IT security firm Trend Micro has published its predictions for 2014. The report focuses on mobile malware, targeted campaigns, attack vectors, data breaches, Java 6 and Windows XP vulnerabilities, the Deep Web, privacy and the Internet of Things (Internet of Everything). Experts believe that cy…

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments