Where to Buy Trend Micro Products

For Home

For Small Business

(M-F 8:00am-5:00pm CST)

For Enterprise

(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region


The Americas

Not in the United States?
Select the country/language of your choice:





For Home

For Business

For Partners

Data Breach

Data Breach: A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Read more
Health insurer Premera Blue Cross disclosed that they have been subject to an attack that exposed the information database of more than 11 million customers.
Tens of millions of current and former customers and employees of Anthem Inc., the second largest health insurance provider in the United States, are reportedly affected in a targeted attack.
  • Passwords: Not Going Away Anytime Soon

    While it’s true that passwords are not the most convenient way of authenticating yourself and they are inherently insecure, we should not be so quick to dismiss them. Here's why.
  • Fingerprint Scans, Passwords, and Managing Online Accounts

    How new mobile technology, such as the Touch ID sensor on the iPhone 5S, is addressing the "password problem"
  • The Trouble With Passwords

    Password security has always been about balancing what people can remember and what’s difficult for attackers to guess. Today's computing environment is making it harder to balance.
  • Password (In)security, Revisited

    These latest data breach incidents teach us that people are still using woefully insecure passwords. Here are a few tips on how to improve your password security.
While the Deep Web has often been associated with The Onion Router (Tor), this research paper introduces other networks that guarantee anonymous and untraceable access—the most renowned darknets and alternative top-level domains.
Trend Micro CTO Raimund Genes explains why an enterprise needs to focus on what really needs to be protected: their core data.
    This research paper discusses how PoS RAM scrapers infect systems and exfiltrate stolen data, and provides a list of strategies and techologies that can be used to defend against the threat.
    PoS malware has evolved rapidly over the past few years, targeting mostly big retail companies from which they could obtain large chunks of data. See how PoS systems—and how the malware that targets them—works, and how to defend against them.
    The evolution of PoS RAM Scraper malware, from their humble beginnings to the industrialized threats that they've become.

    Connect with us on