Protection for all the ways you connect
Save up to 60% on Trend Micro Security
NEW for 2020!
Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale
May 31, 2018
Cellular network technologies such as 3G and 4G allow fast wireless communication. But the next evolution, 5G, is set to afford even faster connections along with greater reliability.
Monero-Mining Malware Targets Mac Users
May 29, 2018
A persistent Monero-miner malware increases CPU activity and drains the batteries of Mac users, making the hardware prone to system slowdown and overheating.
Android Devices Found Preinstalled With Adware Cosiloon
Researchers reported that over a hundred Android devices had been preinstalled with the adware Cosiloon, affecting more than 18,000 gadgets in more than 100 countries.
The Anatomy of a Scam: Fake IRS Messages
May 24, 2018
In many ways, online “phishing” scams have hardly changed since the early 1990’s, when attackers would “fish” for account information of people using American Online.
Reboot Your Routers: VPNFilter Infected Over 500,000 Routers Worldwide
VPNFilter malware has infected routers in more than 54 countries and can be used for attacks, intelligence collection, and destroying devices in a single command worldwide.
Change Your Passwords: Twitter Bug Exposes User Passwords
May 3, 2018
Twitter announced that a bug in their system may have exposed user passwords internally and urged all subscribers to change their account passwords.
PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser
Fortunately, there are things you can do to protect your privacy online — both within the sites themselves and by using third-party tools like Trend Micro’s Privacy Scanner.
PROTECTING YOUR PRIVACY – Part 1: The Privacy Risks of Social Networks and Online Browsing
May 1, 2018
Most Americans today spend many of their waking hours online. Much of this time is spent browsing the web or checking in, updating and sharing via our favorite social networks.
Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals
April 27, 2018
Researchers found a design flaw in Alexa that can be exploited to eavesdrop and transcribe to steal all sensitive information heard.
Page 12 of 19 << ... 10 11 12 13 14 ... >>