{"id":9374,"date":"2017-09-19T09:01:17","date_gmt":"2017-09-19T17:01:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/19\/news-3147\/"},"modified":"2017-09-19T09:01:17","modified_gmt":"2017-09-19T17:01:17","slug":"news-3147","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/19\/news-3147\/","title":{"rendered":"Trend Micro Security\u2019s Layered Protection, XGen\u2122 Machine Learning, and Folder Shield Protect You Against Unknown Ransomware and Malware"},"content":{"rendered":"<p><strong>Credit to Author: Michael Miley| Date: Tue, 19 Sep 2017 13:00:30 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"299\" height=\"196\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/Millennials-may-be-techsavvy-but-theyre-not-necessarily-up-to-speed-on-the-latest-cyber-security-protocols-_459_40147839_0_14131167_300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Millennials may be tech-savvy, but they&#039;re not necessarily up to speed on the latest cyber security protocols.\" style=\"float: left; margin-right: 5px;\" \/><\/p>\n<p>On May 12 of 2017, the WannaCry ransomware struck across the globe, encrypting computers by exploiting a critical vulnerability in Windows, first discovered by the US National Security Agency. Among its first targets were the British National Health Service, Federal Express, and Telefonica, but soon banks, schools, hospitals, government agencies and other organizations were infected, involving some 230,000 computers in 150 countries, as reported in Wikipedia\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\"><em>WannaCry Ransomware Attack<\/em><\/a><em>.<\/em><\/p>\n<p>The unexpected widespread damage and economic costs of WannaCry had everyone from IT managers to everyday users anxiously asking: just how <em>do<\/em> you protect yourself, at work or at home, from attacks by unknown ransomware? Apart from keeping your computer updated with the latest security patches (which would have helped in this case), is there a single surefire security technology that can stop it in its tracks, <em>before<\/em> it infects you and holds you hostage? And more specifically (for the purposes of this article), how does Trend Micro Security (TMS), our flagship product for PCs, protect you from such threats?<\/p>\n<h3>Layered Protection in Trend Micro Security<\/h3>\n<p>Trend Micro provides plenty of advice online to help you protect yourself from ransomware. You can get a leg up on good defense by re-reading Christopher Budd\u2019s <a href=\"http:\/\/blog.trendmicro.com\/ransomware-care-can-protect\/\"><em>Ransomware: What it is, why you should care, what you can do to protect against it<\/em><\/a>, published last year on Simply Security. And you can go to our ransomware page <a href=\"https:\/\/go.trendmicro.com\/sem\/sem\/www.trendmicro.com\/us\/home\/consumer-ransomware\/index.html?_ga=2.228128541.1479832777.1504628744-667336732.1503951669\"><em>Don\u2019t let criminals hold your computer hostage<\/em><\/a> for more facts and tools to address the challenges. But you need to know right away that there\u2019s actually <em>no single, surefire type of security technology<\/em> that, by itself, can protect you from ransomware and other malware threats. The best endpoint protection is always delivered<em> in layers, <\/em>using multiple protective techniques.<\/p>\n<p>Trend Micro Security is an outstanding example of this\u2014and two of its newest protective techniques include XGen (cross-generational) <em>machine learning<\/em> and <em>trusted application <\/em>protection, delivered across several protective layers. <em>Machine learning<\/em> stops never-before-seen threats that can evade signature-based protection, allowing TMS to stay one step ahead of the bad guys. <em>Trusted application<\/em> protection in TMS\u2019 Folder Shield stops changes in protected folders and files by unauthorized applications\u2014those <em>not<\/em> in the trusted application list. Both enhance TMS\u2019 ability to stop unknown malware and ransomware.<\/p>\n<p>But what do we mean by <em>layered protection<\/em>? If you picture a king or queen in a castle (you and your computer!) protected by a moat, walls, and soldiers, you have a simple <em>Game of Thrones<\/em>-type image for how it all works. (The graphic we use here looks more like a target, but perhaps that\u2019s fitting.)<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-539832\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer.jpg\" alt=\"\" width=\"600\" height=\"509\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer.jpg 985w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer-300x254.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer-768x651.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer-640x543.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer-900x763.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer-440x373.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/consumer-380x322.jpg 380w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h5 style=\"text-align: center\"><em>Figure 1. Evolutionary Layered Protection, XGen\u2122, and Folder Shield in Trend Micro Security<\/em><\/h5>\n<p>&nbsp;<\/p>\n<p>First, we use each layer of protection to help determine if a potential invader is good, bad, suspicious, or unknown. If it\u2019s bad, and for any reason we can\u2019t stop it at one layer, we apply the protections in the next layer.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>The Exposure Layer<\/strong>: You can be exposed to ransomware and malware when you merely access the internet, browse the web, click a web ad, or open an email\u2014what we call the <em>critical channels <\/em>or<em> context<\/em>. Right at the outset, Trend Micro Security prevents you from being exposed to harmful threats <em>before<\/em> they can even reach your PC. Using our Smart Protection Network (SPN), we analyze and prevent you from accessing malicious domains and websites in browsers, emails, and social networks. We stop intrusions and calls to botnets. And we make sure your browser and applications aren\u2019t compromised by exploits of vulnerabilities, by analyzing scripts that can lead to malware infections.<\/li>\n<li><strong>The Infection Layer<\/strong>: We refer to the next layer as the \u201cinfection layer\u201d because these are threats that may have evaded the first layer and are now in the process of being downloaded or copied to your device. At this layer, we scan the file as it tries to download, stopping it if our scanning engine determines it to be malicious; and we also scan the files that land or are stored on your PC. In our latest release of Trend Micro Security, we add <em>context<\/em>&#8211;<em>aware<\/em> machine learning, a type of <em>artificial intelligence<\/em>, to determine the likelihood of a file or app being bad. The magic here is <em>how<\/em> we do it\u2014correlating the discoveries machine learning reveals <em>to make the unknown known<\/em>. Suffice to say, the result helps TMS stop heretofore unknown and more sophisticated threats with great accuracy and fewer false alarms than ever before.<\/li>\n<li><strong>The Behavior Layer:<\/strong> The third layer monitors the behavior of the file as executes on your system, including files executing from USB sticks. If the file shows suspicious behavior, changing files or settings in ways or in places it shouldn\u2019t, the process is blocked. Our machine learning magic factors in here too, as we correlate low-prevalence files with types of suspicious behavior, to help discover and stop any heretofore unknown threats. Folder Shield also protects at this layer, stopping the access of files in protected folders, whether on your computer or in a cloud-synced folder on Drobox, Google Drive, or Microsoft OneDrive, by any applications not in the Trusted Application List. If ransomware tries to encrypt files in a protected folder, TMS immediately backs up any encrypted files, stops the encryption process, deletes the ransomware, then uses the backup files to help restore your system to the way it was.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>TMS, Machine Learning, and Folder Shield<\/h3>\n<p>In the end, though there\u2019s no single type of protection against unknown malware and ransomware, Trend Micro Security\u2019s layered approach provides the right industry-leading protection to keep you safe. XGen\u2122 machine learning adds powerful protection for unknown malware and ransomware.\u00a0 And Folder Shield keeps your most important files being held hostage by cybercriminals. Mac users should know that Trend Micro Security\u2019s Antivirus for Mac also uses a layered approach to protection, applying XGen\u2122 machine learning, along with Folder Shield, to stop malware in its tracks. Unknown ransomware doesn\u2019t stand a chance!<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome.html\">Find out more about Trend Micro Security<\/a>, or purchase a <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/maximum-security.html\">subscription<\/a>.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PLZm70v-MT4JrrjgguJYCNR8yNjGq0swB3\">Watch the Trend Micro Security Video Series<\/a>.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PLZm70v-MT4JpIcclO3wkM0SQ8TCJkPb_9\">Watch the XGen\u2122 Threat Protection Video Series<\/a>.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PLZm70v-MT4Jrza_Hu2QuAZWIg1qwPfGf2&amp;disable_polymer=true\">Watch Trend Micro Security\u2019s Folder Shield Video Series.<\/a><\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/trend-micro-securitys-layered-protection-xgen-machine-learning-folder-shield-protect-unknown-ransomware-malware\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Michael Miley| Date: Tue, 19 Sep 2017 13:00:30 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"299\" height=\"196\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/Millennials-may-be-techsavvy-but-theyre-not-necessarily-up-to-speed-on-the-latest-cyber-security-protocols-_459_40147839_0_14131167_300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Millennials may be tech-savvy, but they&#039;re not necessarily up to speed on the latest cyber security protocols.\" style=\"float: left; margin-right: 5px;\" \/>On May 12 of 2017, the WannaCry ransomware struck across the globe, encrypting computers by exploiting a critical vulnerability in Windows, first discovered by the US National Security Agency. Among its first targets were the British National Health Service, Federal Express, and Telefonica, but soon banks, schools, hospitals, government agencies and other organizations were infected,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,3764,3765,714],"class_list":["post-9374","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-malware","tag-ransomware","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9374"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9374\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9374"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}