Category Archives: Bad guys always lose

2020: looking to the future to secure our digital lives

mainbanner1a

Can you imagine what our society will look like at the end of the decade? How will we shop, socialize and consume services? How as businesses will we authenticate customers, manage our services and protect critical data from a growing array of increasingly sophisticated and determined adversaries? Of course, we don’t have all the answers at Trend Micro but we’ve taken a big step in the right direction with our 2020 web-series.
Continue reading

Mobile threats accelerate in 2013

Android malware growth 2013

Android malware growth 2013

At the end of last year we released our predictions for 2013; chief among them was the eye-catching assertion that mobile malware would hit the 1 million mark by the end of the year. At the time, it may have been tempting to dismiss this prediction as a marketing stunt, however the facts and the figures are unfortunately bearing out the truth of this prediction. By the end of the first quarter, we were already over halfway there and by the end of June we counted 718,000 malicious and high risk Android apps in our collection.
Continue reading

New bracelets for ransomware kingpin

Image courtesy of .v1ctor. on Flickr

I’m happy to say that, as a result of close cooperation between Trend Micro threat research and Spanish law enforcement a number of important arrests have been made in connection with the Reveton ransomware. The Spanish police announcement can be found here [Spanish].

Over the past several months Trend Micro researchers have been providing evidence and intelligence related to the Reveton ransomware or “police trojan”. Law enforcement in Spain first became interested in this malware as a result of complaints they were receiving from victims of the scam. Trend Micro and Spanish law enforcement agencies have collaborated extremely closely; sharing intelligence, sharing samples and related technical detail. As a direct result of activities carried out by Trend Micro threat research, they were able to map the criminal network infrastructure including traffic redirection and command and control servers. Some of the intelligence gathered by law enforcement enabled them to reach a high degree of certainty of the identity of one of the individuals at the very top of this criminal gang.
Continue reading