
Experts don’t see an end to ransomware anytime in the near future.
Read MoreTrend Micro has been protecting governments, businesses and consumers from cyber-threats for more than 28 years. Right from the start, our founders were keen to emphasize the important role played by corporations in society as a whole. To that end, we’ve always been an active participant in charitable projects, and employees are always encouraged to…
Read MoreThe endpoint security market is quite dynamic right now, with lots of new entrants, and ongoing innovation for improving threat detection and response. In the midst of all this market energy we are very pleased to be named a Leader in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms (EPP)1. Three vendors were named to…
Read MoreThere’s no arguing the criticality and importance of enterprise apps, but these platforms could be putting your business at serious risk of infection and attack.
Read MoreEvery Mac user will experience the message “Your startup disk is almost full” at one time or another. Understanding what “startup disk is full” actually means is the first important step before you can fix this issue. What if my Mac’s Startup Disk is full? The answer to this question is easy. When your startup…
Read MoreYesterday, the Zero Day Initiative (ZDI) announced the dates and contest rules for Pwn2Own 2018. Last year, we celebrated the 10th anniversary of the event and the 11th year is going to be bigger than ever! Pwn2Own will be returning to Vancouver, BC, at the CanSecWest Conference on March 14-16, 2018. ZDI is partnering with…
Read MoreWelcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Read on for the latest on trojanized malware, smart phone hacks, and cybersecurity legislation. Dark Caracal Group Revealed: Group Used Trojanized Android Apps to Steal Data…
Read MoreWe all know cyberspace can be a scary place. That’s why Trend Micro is here to protect your digital life with a range of comprehensive security products. But we’ve noticed that some of our customers are only protecting their main PC or Mac, leaving other devices – especially smartphones – exposed to modern threats like…
Read MoreFrom an outsider’s point of view, ransomware may appear simple: Take something from the victim and demand money for its safe return.
Read MoreFirst, What is IDPS and Why Do We Care? Intrusion Prevention Systems (IPS) emerged as an improvement on Intrusion Detection Systems (IDS). IDS are out-of-band collectors of network traffic that analyze the information and provide alerts. The “eureka” of IPS was that instead of just alerting, why not block what is a known attack? IPS…
Read More