Protection for all the ways you connect
Save up to 60% on Trend Micro Security
NEW for 2020!
'Mosquito' Attack Shows How Malware Can Exfiltrate Data via PC Speakers
March 13, 2018
Researchers from the Ben-Gurion University of the Negev in Israel demonstrated a proof-of-concept attack they named “Mosquito”.
Two-Factor Authentication: What is it and why do I need it to stay safe online?
We shop, bank, socialize, work and play online. But as our digital lives become increasingly important, they are also exposed to greater risks.
Study Finds Fake News Spreads Faster Than Real News on Twitter
March 12, 2018
In late April 2013, the Twitter account of the Associated Press (AP) surprised its millions of followers after it tweeted that an explosion at the White House injured President Barack Obama.
Trend Micro at MWC: Securing Our Mobile, Connected World
March 01, 2018
Time flies pretty fast in tech. When Trend Micro was founded nearly 30 years ago, mobile phones were pretty clunky, prohibitively expensive and not in the least bit “smart.”
OMG Mirai Variant Turns IoT Devices Into Proxy Servers
February 28, 2018
A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers.
Vulnerabilities can Let Hackers Hijack Tinder Accounts with Just a Phone Number
February 27, 2018
Security researcher Anand Prakash uncovered vulnerabilities in Tinder and the way it uses Facebook’s Account Kit.
A Look Into the Most Noteworthy Home Network Security Threats of 2017
Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users’ information and security.
2017 Mobile Threat Landscape
February 26, 2018
We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.
Security 101: Digital Extortion in 2018
February 13, 2018
Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money
Page 15 of 19 << ... 15 16 17 18 19