Tags » Trend Micro

Protecting Point of Sales Systems from POS Malware

While closed, embedded POS systems drastically reduce your threat exposure, there are a number of other options you can utilize to protect your POS systems and their networks.  22 more words

Interesting Web Articles

Apple pushes Adobe Flash update to Mac users following triple zero-day vulnerabilities

”Apple has issued a compulsory update forcing Mac OS X users to upgrade to the latest version of Flash, following the discovery of three zero-day vulnerabilities in the software,” Alastair Stevenson reports for V3. 108 more words

News

Trend Micro Discovers iOS Espionage App, Requires User Intervention to Install

A recently discovered malware campaign named as “Operation Pawn Storm” has begun to target Apple’s iOS devices with a new malicious application that can do the following: steal photos, text messages, contacts and other data from non-jailbroken iPhones. 73 more words

Trend Micro named a leader in Gartner Magic Quadrant for Endpoint Protection Platforms

(adsbygoogle = window.adsbygoogle || []).push();

New Delhi, India, January 12, 2014: Trend Micro Incorporated, a global player in security software and solutions, today announced it has been positioned by Gartner, Inc. 11 more words

Trend Micro announces ASUS ZenFone 2 will preload Trend Micro’s Dr. Safety App

New Delhi, India, January 8, 2015: Mobile security threats are becoming more prevalent as the popularity of smartphones increases. But just as mobility is sweeping the world so is Android malware which is soaring in number every year. 7 more words

Breaking News

Trend Micro announces Strategic OEM agreement with HP

New Delhi, India, December 17, 2014: Trend Micro Incorporated, a global leader in security software and solutions, has signed a strategic OEM agreement with HP to help enterprises combat advanced targeted threats and custom malware. 10 more words

Breaking News

The Rise of Spearphishing

Google, the Pentagon, the White House, RSA, HBGary Federal, the New York Times.

That’s a list of organizations you’d expect to have top-notch IT security, right? 409 more words

Information Technology