Trend Micro March 2014
Trend Micro Trendsetter Consumer Newsletter
Blog: Why Do I Need Protection on My Mobile Device? SIMPLY SECURITY
Why Do I Need Protection on My Mobile Device?
There are cybercriminal groups out there who are looking to benefit from your mobile device, and they have the means to do it. The most common way to acquire a malicious mobile app is by downloading it from a third party Android app store.
Read the blog to learn more >>
Slide Show: 12 Most Abused Android App Permissions TRENDLABS ADVICE
The 12 Most Abused Android App Permissions
Android apps need permissions in order to work—such as to your GPS location, Wi-Fi state, or full Internet access. However, cybercriminals can exploit these for personal gain. Check out the most commonly requested permissions and learn how they're abused.
View the slide show >>
It Can Happen to You... And What You Can Do About It
Christopher Budd says his charmed life came to an end one Friday evening, via an email from his credit card company. It asked him if he had made a charge for $268 with an online vitamin seller in Florida? He knew he had not...
Get 10 tips for what to do before or after credit fraud >>
Infographic: Separating Corporate from Personal Data on Mobile Devices INFOGRAPHIC
Separating Corporate from Personal Data on Mobile Devices
The "Bring Your Own Device" to work trend is creating issues of data protection and privacy for both employees and the organizations they work for. Another complication is 70% of employees surveyed are using company-owned tablets to download personal apps.
View the infographic >>
What We're Reading Blog Series KEEPPING KIDS SAFE ONLINE
Parents Should Relax, Protecting Student Data, and More
Trend Micro blogger Lynette Owens reviews a new book by danah boyd. The book, It's Complicated: The Social Lives of Networked Teens, is about adolescents' behaviors online and recommends ways for parents to get involved with their children's online lives.
Read Lynette's blog >>
Customer Reviews for Trend Micro Titanium™ Maximum Security
Overall rating: 4.8 of 5 Stars
Read the reviews >>
In the News
Target CIO Resigns Following Breach >>
China Cyber-gangs Use 'Vast Underground Network' >>
Meetup's Multi-Day Outage Was Due to a Newer, More Powerful Type of DDoS Attack >>
Thieves Jam Up Smucker's, Card Processor >>
7 Hidden Dangers of Wearable Computers >>
Copyright © 2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.
Subscribe to our newsletters >>
Pinterest Facebook Twitter YouTube