Trend Micro

5 key questions to determine your security posture
To understand any businesses’ security posture, one must first understand the eight categories of cybersecurity that is impacted: security intelligence, fraud, people, …

Android adware infiltrates devices’ firmware, Trend Micro apps
Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …

Sophisticated threats dictate future response strategies
Trend Micro released its annual security roundup report which dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, …

Trend Micro Cloud App Security integrates with Box, Dropbox and Google Drive
Trend Micro announced the expansion of its Cloud App Security at the RSA Conference. Cloud App Security enhances cloud file sharing and collaboration services and Microsoft …

Google researchers finds critical flaws in Trend Micro AV solution
If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …
Featured news
Resources
Don't miss
- Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
- Android financial threats: What businesses need to know to protect themselves and their customers
- Post-quantum cryptography and the future of online safety
- How to manage and protect your biometric data
- UK NCSC offers security guidance for domain and DNS registrars