trend micro research
-
IoT
A Roadmap to Secure Connected Cars: Charting the WP.29’s UN Regulation No. 155
Connected cars are now on the way to becoming a regular part of everyday traffic all over the world. How…
-
IoT
The Transition to 5G: Security Implications of Campus Networks
Download Attacks From 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Networks Globally, organizations are anticipating (if…
-
IoT
Lost in Translation
Translation makes it possible to exchange information across the globe, regardless of language differences. Translation plays a similar role in…
-
IoT
The Cybersecurity Blind Spots of Connected Cars
Technology has accelerated the pace in which vehicles provide mobility and convenience. Nowadays, it’s common for connected cars to let…
-
The Deep Web
Commodified Cybercrime Infrastructure
Cybercriminal takeover The server takeover is the earliest stage, where exposed assets are enumerated (i.e., via network scanners), accessed, and…
-
The Deep Web
Commodified Cybercrime Infrastructure: Exploring the Underground Services Market for Cybercriminals
Cybercriminal takeover The server takeover is the earliest stage, where exposed assets are enumerated (i.e., via network scanners), accessed, and…
-
The Deep Web
Securing Enterprise Security: How to Manage the New Generation of Access Control Devices
Trend Micro Research Given the increasing use by enterprises of contactless security solutions, the security of the devices that themselves…