Posts Tagged ‘Trend Micro’

New arrivals: Trend Micro Maximum Security Cloud Edition

Wednesday, September 17th, 2014

Trend Micro has launched the security solution to reduce vulnerabilities to intrusion of privacy and offers protection anytime, anywhere and on any device. Available in Singapore from 19 September for one (S$39), two (S$99) and three (S$129) devices.

Available in Singapore from 19 September at all leading IT retailers and online at the Trend Micro website - for one (S$39), two (S$99) and three (S$129) devices.

Available in Singapore from 19 September at all leading IT retailers and online at the Trend Micro website – for one (S$39), two (S$99) and three (S$129) devices.

To protect consumers from the perils of Internet across multiple devices, Trend Micro has released its most comprehensive security solution available that offers protection from cyber threats for PC, Mac, Android and now iOS platforms.

The new Trend Micro Maximum Security Cloud Edition improves consumer security and privacy across PC, Mac, iOS and Android devices.

The new Trend Micro Maximum Security Cloud Edition improves consumer security and privacy across PC, Mac, iOS and Android devices.

Trend Micro Maximum Security Cloud Edition is an all-in-one consumer solution that helps resolve both security and privacy issues that continue to plague Internet users.

As mobile device accounts are becoming more commonly shared with home computer networks, Trend Micro developed the Maximum Security Cloud Edition to provide protection for users no matter which device is being used at any given time.

Solutions like Trend Micro Maximum Security Cloud Edition are more necessary than ever, as verified by the results of a recent poll revealing that risky behavior by Internet users was generating new attack opportunities for cyber criminals.

(more…)

Infographic: Singapore Internet users concerned about privacy on Social Networks

Tuesday, September 16th, 2014

An online poll finds that 3 in 4 Internet users in Singapore are concerned about privacy on Social Networks. However, almost 66 percent of respondents in Singapore are not protected on their mobile devices and personal computers.

The recent online poll was conducted by Trend Micro Incorporated - a global developer of security software - between August to September 2014 surveying 744 respondents in Singapore.

The recent online poll was conducted by Trend Micro Incorporated – a global developer of security software – between August to September 2014 surveying 744 respondents in Singapore.

Internet users in Singapore are concerned about sharing private information on social networking sites (76%), and as many as 69 percent of respondents deleted or hid timeline posts they had shared previously.

“电脑防卫软件出版商 Trend Micro 的网上调查显示,新加坡的网上用户注重社交网络的私隐,但大多数人的电脑与手机却未安装安全软件。” – 科技点心(微薄)

Security solutions are therefore more necessary than ever, as verified by the results of the poll revealing that risky behavior by Internet users was generating new attack opportunities for cyber criminals.

“Consumers today are very reliant on their devices, with an average individual owning around five digital devices each. Yet, they often forget that having more devices also increases their exposure to cyberattacks,” said Terrence Tang, Senior Director of Consumer Business, Asia Pacific, Trend Micro.

“Consumers today are very reliant on their devices, with an average individual owning around five digital devices each. Yet, they often forget that having more devices also increases their exposure to cyberattacks,” said Terrence Tang, Senior Director of Consumer Business, Asia Pacific, Trend Micro.

Survey findings included:

(more…)

Trend Micro exposes undetectable malware against bank session tokens

Wednesday, July 23rd, 2014

Are your devices infected? “Operation Emmental” is a new criminal operation which targets banks that use session tokens such as Short Message Service (“SMS”) for authentication purposes – to steal customers’ online banking credentials to gain full access and control of their bank accounts.

A comparison between the two-factor authentication process in uninfected and infected computers with Operation Emmental.

A comparison between the two-factor authentication process in uninfected and infected computers with Operation Emmental.

Like Swiss Emmental cheese, the ways in which your online banking accounts are protected might be full of holes, or rather loopholes.

Commenting on today’s rampant mobile cybercrimes, Paul Oliveria, Technical Communications Manager of Trend Labs, Trend Micro shared: “Monetary benefits remain the biggest motivation for cybercriminals. Based on Trend Micro TrendLabs 1Q 2014 Security Roundup report, the number of online banking malware detections in the first quarter reached roughly 116,000 showing a steady increase from the same quarter in 2013.”

Cloud security experts Trend Micro warns of “undetectable” malware infection that targets mobile banking users.

Currently prevalent in Austria, Sweden and Switzerland, this cybercrime has reached Japan, leaving the Asia Pacific region at greater risk of a similar attack.

Mobile devices are also increasingly being included in cross-platform threats.

With mobile devices no longer being just phones and serve as computer substitutes in their own right, users are often connecting their mobile devices to their home/work systems to sync their files and documents.

This link between the devices is what threats use to jump across.

(more…)

Trend Micro tips against Iron Man 3 fake screening sites

Tuesday, May 7th, 2013

With the popularity of Iron Man 3, cybercriminals are using social networks to spread links to websites that purport to offer free screenings of the blockbuster – but instead lead to potentially malicious sites.

Be wary of links to websites offering free streaming or download of Iron Man 3 movie.

Be wary of links to websites offering free streaming or download of Iron Man 3 movie.

The scams utilised popular blogging platforms and social networks, such as Tumblr, WordPress and Blogger, to trick home viewers into downloading video installer files and click on malicious links and adware that may lead to survey scams and spam.

The same is seen on Facebook, where links to supposed Iron Man 3 streaming sites lead users to survey scams instead.

Some sites do not even lead to actual Iron Man 3 movie content, instead asking users to register and provide their credit card number – a move that is highly suspicious.

Here are some tips from Trend Micro for movie buffs to stay vigilant online.

  1. (more…)

Trend Micro unveils Smart Protection Strategy for enterprises

Tuesday, April 9th, 2013

With the rise of targeted attacks, Trend Micro urges enterprises to redefine their security strategy to focus on the three C’s: Custom Defense, Complete End User Protection and Cloud Security.

Trend Micro celebrates 25 years this year, since its founding in 1988.

Trend Micro celebrates 25 years this year, since its founding in 1988.

With perimeter defense and conventional security becoming less effective against advanced targeted attacks, Trend Micro today announced the launch of Smart Protection Strategy to help enterprises redefine their security strategy in the wake of more sophisticated, stealthy and persistent cyber threats.

Eva Chen – CEO and Co-Founder, Trend Micro – described in detail the company’s Smart Protection Strategy at the annual Trend Micro APAC Media Summit 2013 in Singapore today.

JD Sherry – Global Director of Technology and Solutions, Trend Micro – then shared his perspective on the rapidly changing threat landscape, proposing how he believes cyber defence could be carried out in the new cloud era.

The three tenets of Trend Micro’s Smart Protection Strategy are extracted from the company’s press release and appended below. The full press release may be viewed/downloaded here.

(more…)

Trend Micro CloudSec 2012 in Singapore

Wednesday, August 15th, 2012

This year’s theme is “Have a safe journey” and features thought leaders such as Jim Reavis from CSA and Tim Grance from NIST, in a full day’s programme bringing CXO attendees through security issues surrounding Cloud Computing.

CloudSec 2012 was held at Raffles City Convention Centre in Singapore on 15 August.

CloudSec 2012 was held at Raffles City Convention Centre in Singapore on 15 August.

I sat through a panel discussion over lunch that shed some light on the thoughts that Reavis, Grance and Nicholas Tan (VMware) had on cloud security.

Jim Reavis, Co-founder & Executive Director Cloud Security Alliance (CSA)

Jim Reavis, Co-founder & Executive Director Cloud Security Alliance (CSA)

One opinion that may come as a surprise to many people is Reaves’ belief that the choice of whether a company should adopt a private, public or hybrid cloud should not be driven by security alone, which is what most people would use as the immediate and main consideration, if not the sole determinant for their decision.

He felt that security could be a red herring in deciding between the different types of cloud implementation.

Instead, the decision should be based on compliance (regulations on cloud use and location of data centres), performance (whether on-premise servers are needed to reduce latency) and legacy support (transition from existing IT architecture).

Timothy Grance, Senior Computer Scientist, National Institute of Standards and Technology (NIST)

Timothy Grance, Senior Computer Scientist, National Institute of Standards and Technology (NIST)

Grance added that all the models are viable and the choice also involved the need for scale, which has to be balanced with the risk appetite of the organisation making the choice.

All the panelists were unanimous that, in reality, the considerations for security for cloud is no different from traditional systems, although the specific technology employed may be different.

Whether your systems are on a cloud or not, you would be facing threats, you still need to be vigilant, you still need to be rigorous about security, and you’d still need quality people to design and operate the system.

Last year’s CloudSec 2011 at The Sheraton Towers saw more than 300 participants examining the theme of “Have a vision not clouded by fear”.

This year, Trend Micro made the event bigger with more than 500 showing up at the Raffles City Convention Centre on 15 August.

(more…)

BlackBerry OS vs iOS vs Windows Phone vs Android

Monday, April 16th, 2012

Trend Micro has released the results of its study on the four main mobile operating systems in a report titled “Enterprise Readiness of Consumer Mobile Platforms”.

The security firm found the BlackBerry 7 OS the most secure mobile operating system, followed by iOS 5, Windows Phone 7.5, and Android 2.3.

Summary chart from “Enterprise Readiness of Consumer Mobile Platforms” White Paper by Trend Micro.

Summary chart from “Enterprise Readiness of Consumer Mobile Platforms” White Paper by Trend Micro.

Android 2.3 was used in the study because it was the dominant installed/supplied version of Google’s mobile OS at the time of the research.

Below is an excerpt from the White Paper summarising the findings about the four mobile platforms.

(more…)