Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Mobile Safety

According to security experts, “new mobile payment methods will introduce new threats.” Before you use your devices to pay for something this shopping season, check out this roundup of mobile insights and incidents we've seen so far.
While still offering a relatively safe mobile environment, the iOS platform still has it's own share of threats. Masque and Wirelurker are only the latest, but not the last, threats to target Apple device users.
Wirelurker, a malware family that targets Mac and iOS devices, has been discovered to infiltrate even non-jailbroken devices. But should there be a cause for panic?
Mobile apps are used for just about everything these days. Unfortunately, millions of apps are also categorized as malicious. How can app stores ensure that their apps are safe?
This Trend Micro research looks into the emergence of the “mobile underground” in China as a result of the market's shift to mobile platforms, including mobile underground products and services.
Over several months, our researchers monitored the Chinese mobile cybercriminal underground to see what kind of wares cybercriminals were trading. What they found was a diverse set of offerings created to suit different purposes.
Are you a digital hoarder? Unnecessary files can strain on your computer’s memory. But there are ways to rid your life of digital clutter. You can start by taking account of those things you use to access and exchange digital information.
What you need to know about mobile privacy, and what you need to do to prevent cybercriminals from getting to the files and information on your mobile device.
If you think how you’re using your mobile device is secure enough, you may want to reconsider. You may be guilty of doing things that are jeopardizing your own security every time you're on your tablet or smartphone.
Mobile payment systems are becoming a more popular method of payment for people on the go. This shopping season, learn how mobile payments work, the threats that come with it, and what you can do to stay secure.
With Cyber Monday sales expected to rake in another record in most online sales in a day, threats are swooping in where people are most available and vulnerable. Secure your mobile shopping by following this flowchart.
To maximize the benefits of BYOD without increasing the risks, companies and their employees need to strike a balance between maintaining employee privacy and having control over corporate data on devices.

Connect with us on