Where to Buy Trend Micro Products

For Home

For Small Business

(M-F 8:00am-5:00pm CST)

For Enterprise

(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region


The Americas

Not in the United States?
Select the country/language of your choice:





For Home

For Business

For Partners

Data Breach

Data Breach: A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Read more
Tens of millions of current and former customers and employees of Anthem Inc., the second largest health insurance provider in the United States, are reportedly affected in a targeted attack.
A list of some of the most notable data breach incidents that affected different industries in 2014, and what we can learn from them.
  • Passwords: Not Going Away Anytime Soon

    While it’s true that passwords are not the most convenient way of authenticating yourself and they are inherently insecure, we should not be so quick to dismiss them. Here's why.
  • Fingerprint Scans, Passwords, and Managing Online Accounts

    How new mobile technology, such as the Touch ID sensor on the iPhone 5S, is addressing the "password problem"
  • The Trouble With Passwords

    Password security has always been about balancing what people can remember and what’s difficult for attackers to guess. Today's computing environment is making it harder to balance.
  • Password (In)security, Revisited

    These latest data breach incidents teach us that people are still using woefully insecure passwords. Here are a few tips on how to improve your password security.
While the Deep Web has often been associated with The Onion Router (TOR), this research paper introduces other networks that guarantee anonymous and untraceable access—the most renowned darknets and alternative top-level domains.
Trend Micro CTO Raimund Genes explains why an enterprise needs to focus on what really needs to be protected: their core data.
    PoS malware has evolved rapidly over the past few years, targeting mostly big retail companies from which they could obtain large chunks of data. See how PoS systems—and how the malware that targets them—works, and how to defend against them.
    The evolution of PoS RAM Scraper malware, from their humble beginnings to the industrialized threats that they've become.
    The most immediate security risk to businesses and customers lies in accepting payments through a PoS system. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.

    Connect with us on