Trend Micro Launches Web App Security Offering

Trend Micro Launches Web App Security Offering

The security-as-a-service solution is based on technology from two recently acquired firms

Trend Micro Infographic: Are You Safe Online?

Trend Micro Infographic: Are You Safe Online?

The security firm analyzes how cybercriminals catch up with the digital landscape

Android Devices May Have up to 11 Vulnerabilities – Infographic

Android Devices May Have up to 11 Vulnerabilities – Infographic

Trend Micro analyzes the security of Android smartphones and tablets

Trend Micro Releases Report on Windows 8 and Windows RT

Trend Micro Releases Report on Windows 8 and Windows RT

The study focuses on security, but it also analyzes functionality and hardware issues

Experts Find Multiple Security Flaws in Trend Micro’s DirectPass 1.5.0

Experts Find Multiple Security Flaws in Trend Micro’s DirectPass 1.5.0

The security solutions provider addressed three vulnerabilities

Watch: Trend Micro CTO Shares Insight on Efficiency of Endpoint Antimalware

Watch: Trend Micro CTO Shares Insight on Efficiency of Endpoint Antimalware

Raimund Genes explains what companies do to make sure malware is kept at bay

Critical Infrastructures from Latin America Increasingly Targeted by Hackers

Critical Infrastructures from Latin America Increasingly Targeted by Hackers

Trend Micro and OAS have released a study on the cybersecurity trends from Latin America

Download Trend Micro SafeGuard for Windows 8 Metro

Download Trend Micro SafeGuard for Windows 8 Metro

Surf the Internet safely with this free app for Microsoft’s new OS

Trend Micro Introduces Enterprise Security and Data Protection

Trend Micro Introduces Enterprise Security and Data Protection

The solution can be used for tablets, smartphones, laptops, removable drives, and more

Trend Micro Publishes Research Paper on Asprox Spam Botnet

Trend Micro Publishes Research Paper on Asprox Spam Botnet

The botnet is responsible for most of the DHL, US Postal Service and FedEx spam

Trend Micro Enhances Custom Defense to Identify and Block C&C Communications

Trend Micro Enhances Custom Defense to Identify and Block C&C Communications

The solution will enable enterprises to better protect themselves against APTs

In 2012, Trend Micro Identified 4,000 Phishing URLs Designed for Mobile Web

In 2012, Trend Micro Identified 4,000 Phishing URLs Designed for Mobile Web

Most of the malicious sites replicated the ones of financial institutions

Most of the Changes in BlackHole 2.0 Made to Evade Efforts of Security Experts

Most of the Changes in BlackHole 2.0 Made to Evade Efforts of Security Experts

Trend Micro analyzes the evolution of the notorious exploit kit

All You Need to Know About Managing Your Mobile Privacy – Infographic

All You Need to Know About Managing Your Mobile Privacy – Infographic

Mobile malware isn't the only thing you should be concerned about

Cybercriminals Use Legitimate Tools in APT Attacks, Experts Say

Cybercriminals Use Legitimate Tools in APT Attacks, Experts Say

Trend Micro experts provide some valuable advice for IT security teams

Real-Time Map from Trend Micro Shows Global Botnet Activity

Real-Time Map from Trend Micro Shows Global Botnet Activity

Over 618 command and control servers found to be active over the past 14 days

What Can Happen When Automated Homes of the Future Get Hacked – Infographic

What Can Happen When Automated Homes of the Future Get Hacked – Infographic

Trend Micro on Internet-enabled devices and the associated security risks

 
Want more? Browse: