Trend Micro, a global pioneer in security software and solutions, has partnered with the International Telecommunication Union (ITU), the UN’s specialised agency for ICT, in support of its Global Cybersecurity Agenda.
Trend Micro, a global virtualization and cloud security leader, will release its finding on the greatest IT security threat to business in the Mena region at the upcoming Gitex Technology Week in Dubai.
The company will also demonstrate
Trend Micro has expanded its social network privacy technology, which identifies privacy settings that may leave personal or inappropriate information publicly available or vulnerable to identity theft.
The solution gives users co
Most cyber attacks target small businesses which run their web servers from inside their own networks, without much awareness about how to secure them properly.
Insecure servers of small business are a prime target, said a stateme
Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited as major cyber-security threats in a report.
Trend Micro's Q2 2013
Trend Micro, a global leader in security software and solutions, said it has collaborated with world's largest international policing organisation, Interpol, to support global law enforcement programs against cybercrime.
Mobile payments have been predicted to reach $1.3 trillion annually by 2017, while cyber threat to user data is also expected to increase, according to a report.
Cybercriminals have broadened their means of infection by targeting
The Family Online Safety Institute (Fosi) has announced that Trend Micro has become the latest member of the global Fosi family.
Trend Micro develops Internet content security and threat management solutions that make the world sa
The International Cyber Security Protection Alliance (ICSPA) has launched a global consultation, which will be headed by its law enforcement partner Europol to analyse current trends in cybercrime and how they may evolve over the next eight year
Top socially visible events of the first quarter of 2012 gave cyber criminals new social-engineering campaign material, equipping them to penetrate and infect users and networks in order to access victim’s data, a report said.