• Login
Trend Micro Security Trend Micro Security
Business 
For Home 
  • The Americas
  • United States
  • Brasil
  • Canada
  • México
  • Asia Pacific Region
  • APAC
  • Australia
  • 中国 (China)
  • Hong Kong (English)
  • 香港 (中文)
  • भारत गणराज्य (India)
  • Indonesia
  • 日本 (Japan)
  • 대한민국 (South Korea)
  • Malaysia
  • New Zealand
  • Philippines
  • Singapore
  • 台灣 (Taiwan)
  • ราชอาณาจักรไทย (Thailand)
  • Việt Nam
  • EUROPE, MIDDLE EAST & AFRICA
  • België (Belgium)
  • Česká Republika
  • Danmark
  • Deutschland, Österreich Schweiz
  • España
  • France
  • Ireland
  • Italia
  • Nederland
  • Norge (Norway)
  • Polska (Poland)
  • Россия (Russia)
  • South Africa
  • Suomi (Finland)
  • Sverige (Sweden)
  • Türkiye (Turkey)
  • United Arab Emirates
  • United Kingdom
    Home >
  • Newsroom
  • Newsroom
  • Coverage
  • Press Releases
  • Press Contacts
  • Search
Advanced Search

 
2019 2018 2017 2016 2015 2014
  • After the VTech hack, some tips on keeping your kids safe
    December 8, 2015

    Mark Nunnikhoven, vice president of cloud research for the IT security company Trend Micro, notes that when it comes to toys like VTech's, there's nothing stopping you from setting up your child's account with a different name, fake picture and other false information. And most of the time, you can refuse to provide it all together.

  • US cyber criminal underground a shopping free-for-all
    December 7, 2015

    According to a new report by Trend Micro, the North American cyber criminal underground isn't buried as deep as in other geographies.

  • This is the devious way thieves can steal your credit card number — and how you can stop it
    December 4, 2015

    Interestingly, some of these devices are installed at retail outlets not by criminals, but by thebusinesses themselves. "Such was the case that made the news this August," a report from Trend Micro said. "A company reportedly sold the modified devices to a number of small restaurants and hotels. Investigators found 1,100 sets of stolen card information stored in the company's servers."

  • Hotel sector faces ‘cyber crime wave’
    November 27, 2015

    “The reality is the sector as a whole is dealing with a cyber crime wave,” said Tom Kellermann, chief cyber security officer at Trend Micro, which sells security software.

  • Public private partnership results in arrests of two suspected malware creators
    November 26, 2015

    The reFUD.me malware services website has been taken down thanks to a joint effort between the National Crime Agency and Trend Micro.

  • Leaked Data Search Engines Flood Chinese Cyber Underground
    November 24, 2015

    The Chinese cybercrime underground has evolved to feature search engines to help darknet users find leaked data, and ATM and POS skimmers to capitalize on the growing consumer trend for non-cash payments, according to Trend Micro.

  • As China moves to payment cards, cybercriminals follow
    November 23, 2015

    As China increasingly embraces payment cards over cash, Trend Micro is seeing an uptick in cybercriminal activity aimed at card fraud.

  • A Decade of Data Breaches: Facts and Myths
    November 19, 2015

    However, this decline is not necessarily a positive indicator, according to Christopher Budd, threat communications manager with Trend Micro, the global cloud security company that issued the report, "Follow the Data: Dissecting Data Breaches and Debunking Myths."

  • Gmail to Warn Users of Unencrypted Email
    November 16, 2015

    "The security landscape is very fragmented and very discombobulated with regard to encryption," said Paul Ferguson, a threat research advisor at Trend Micro. "There doesn't seem to be a lot of coherency, to the point where end users are confused and don't know how to properly protect themselves."

  • Mystery Remains of Who Had Fingers on Keyboard in JPMorgan Hack
    November 13, 2015

    Data stolen from the targets might also have been shared with others in Russia, if that is where the hacker is working, for his own protection, said Tom Kellermann, chief cybersecurity officer for Trend Micro Inc. "This is not over," Kellermann said. "The real question now is how many backdoors are still in these systems that have yet to be detected."

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

  • Contact Us
  • Careers
  • Privacy
  • linkedin
  • twitter
  • facebook
  • youtube
  • rss
Copyright © Trend Micro Incorporated. All rights reserved.
Business Wire NewsHQSM