Protect your devices and online
activity with our free resources
For users whose computers have been infected and held hostage by certain versions of ransomware. We make it easy to regain access to your system and files. To better understand ransomware, read about it in our security intelligence glossary.
Crypto Ransomware is a type of ransomware which encrypts files making them unusable by the user. To regain access, victims are asked to pay a ransom. Our decryption tool decrypts certain variants of crypto ransomware, so you don’t have to pay up.
Free detection and removal for lock screen ransomware. This type of malware prevents or limits users from accessing their system, forcing them to pay a ransom in order to regain access to their systems, or to get their data back.
Protect important files and treasured photo memories from ransomware attacks. Ransom Buster provides protection against all forms of ransomware and adds an additional layer of protection to your PC, even if you have security software installed.
Our free mobile apps and widgets protect you from web threats, help you manage your passwords and devices, and keep the security of your device up-to-date.
Protect yourself from phishing and web threats while browsing the Internet from your iPhone, iPod Touch, or iPad device.
Protect yourself from phishing and web threats while browsing the Internet from your Android device.
Manage website passwords and login IDs in one secure location, so you need only to remember one password.
Get protection from malware and web threats. Detect, identify, and clean computers that have been infected by viruses and other malware.
Think your PC is infected? Scan your PC for a wide range of web security threats including viruses, worms, Trojans, and spyware.
HouseCall identifies and fixes vulnerabilities to help prevent re-infection.
HouseCall for Home Networks
Scan your devices for security risks and protect your privacy and data.
This tool has been released to the open source community and is no longer maintained by Trend Micro. Please visit Sourceforge.net for more information on the obtaining the tool and any related community support.
Scan for hidden files, registry entries, processes, drivers, and the Master Boot Record (MBR) to identify and remove rootkits.
Stop wondering about the dangers of suspicious messages from strangers and find out for sure. Just share the content with Fraud Buster – a free service with no registration required.