Did you know that by 2018, around 1.3 million industrial robots will be set to work in factories around the world? It’s an industry estimated to be worth $32 billion by next year, helping to power a fourth industrial revolution built on smart factories and automated processes. Yet as these robots become increasingly important in a range of industries, they’ll inevitably begin to pique the interest of cybercriminals and nation state hackers. The question is, just how exposed are they to cybersecurity threats, and what can be done about it?
That’s what Trend Micro set out to answer for the first time in a ground-breaking new report: Demonstrating Industrial Robot Attacks in Today’s Smart Factories. Its findings confirm Trend Micro as a leader in industrial IoT security, a message we’ll be taking to the Infosecurity Europe show in June. Continue reading →
Trend Micro blocked an astonishing 81+ billion threats for customers in 2016, according to our newly released TrendLabs 2016 Security Roundup. If any stat speaks of the scale of the challenge facing organisations from online attackers – and the need for comprehensive multi-layered protection – it’s this one. Ransomware unsurprisingly led the way last year, with a 752% increase in new malware families discovered. But it’s Business Email Compromise (BEC) that potentially threatens to cause more problems going forward. Continue reading →
Indicators of compromise (IOCs) are an incredibly important forensic artifacts which, as the name suggests, are used in incident response and threat research to discover if a system has been compromised. They come in various forms, for example, unusual outbound network traffic, an MD5 file in a temporary directory, or even log-in irregularities. One class of IOCs so far resistant to detection by traditional methods relates to the use of external content in web-based attacks.
At Black Hat Europe earlier today, Trend Micro senior security researcher Marco Balduzzi, explained how a new machine learning approach can reap fantastic results for early detection of such threats. Continue reading →
Guest blog by Andrew Tang, Service Security Director at MTI Technology With a fantastic turnout at CLOUDSEC 2016, attendees comprised of security and IT practitioners from numerous industries. Despite these varying sectors, one thing became abundantly clear: the same issues are keeping IT security professionals awake at night – securing cloud environments, securing privileged access accounts and user education. Continue reading →