Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Never fear when Trend Micro is near: The new free app that protects consumers
The new free app aims to help people become aware of how many connected devices they have at home and the potential risks that they have...
Australia a hot target for BEC scams, malicious URLs and malware
More than a quarter of all business email compromise (BEC) scams around the world target Australia, new research says.
EMOTET banking malware returns with a wider scope & vengeance
The EMOTET banking malware has emerged with a wider target scope than ever before, three years after it was originally found.
Trend Micro says C-level executives are not prepared for GDPR
The company refers to a survey they conducted that shows some organisations need to be better prepared for when the scheme is implemented.
Draw your way to $14,000 in the What’s Your Story? poster competition
Techday is proud to be supporting the What’s Your Story? poster competition...
Fileless malware sneaks into Windows machines via USB flash drives
A malicious backdoor called BKDR-ANDROM.ETIN is using fileless malware to infect systems through USB flash drives.
$500,000 zero-day prize pool for Mobile Pwn2Own contest in Japan
Trend Micro has put more than US$500,000 towards a prize pool that aims to find security vulnerabilities at the upcoming Mobile Pwn2Own contest.
Trend Micro announces partnership with VMware Cloud on AWS
Trend Micro has announced its server security product is now available to customers of VMware Cloud on Amazon Web Services (AWS).
Parents, combat cyberbullying with Trend Micro’s Home Network Security
“Parents can now protect their children against dangers such as cyberbullying and online predators..."
Hands-on review: Trend Micro’s Home Network Security simplifies how we get protected from cyber attacks
Protecting your devices from cyber attacks has never been this easy.
Time for kids to go outside and smell the roses: How to limit screen time in a connected world
Children have countless options on how they connect to the internet, so how do parents limit screen-time?
How to make your smart home safe when hackers are looming nearby
The more devices you connect to your network the more you need to protect, your data may be at risk...
GhostClicker adware infiltrated 300 apps on Google Play
A pervasive auto-clicking adware by the name of GhostClicker has infected as many as 340 apps from Google Play.
How your online dating profile can be traced back to your workplace
Online dating apps can go beyond the world of personal matchmaking and be used at weapons for cyber attacks against corporate organisations.
New report details exploits of notorious cyberespionage group with EMEA targets
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
New version of SambaCry spotted in the wild: Linux users urged to update OS
Trend Micro researchers have discovered a newer version of the SambaCry malware, named ELF-SHELLBIND.A.
Trend Micro & VMware tie the knot around mobile threat management
Trend Micro has joined VMware’s Mobile Security Alliance this week, as the companies seek to tackle the growing number of mobile security threats.
Trend Micro launches US$100 million venture fund to harness the IoT wave
Trend Micro’s venture will offer companies financial backing, access to its world-class global threat intelligence, and strategic alliances.
War of the words: How cybercriminals are selling fake news through the underground
"Monetary outcomes of fake news come both from advertising and the reaction – like fake news supporting donations to a cause."
Trend Micro's ten steps for securing our smart cities
Right now there are 250 smart city projects underway in 178 cities worldwide, but how do those projects tackle cybersecurity?
The need for internet security on your devices
At home or at work, on a mobile device or on a network, Trend Micro covers all aspects of cybersecurity.
The need for internet security on your mobile
As hackers target mobile devices, it’s imperative to ensure that you are aware of the threats that are out there, and that your phone is protected.
What makes Locky and Cerber ransomware so good - and what about CradleCore?
Locky, Cerber and... CradleCore? What makes these three ransomware strains so pervasive?
What makes the Cerber ransomware so agile?
The Cerber ransomware has been one of the most nimble, varied and dominant malware strains on the market — almost neck-and-neck with Locky.