Trend Micro Archives - Page 3 of 7 - The Tech Revolutionist
Trend Micro Protects Personal Data and Priceless Files with Enhanced Security Software

Trend Micro Protects Personal Data and Priceless Files with Enhanced Security Software     Singapore, September 14, 2016 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, has today reaffirmed its commitment to providing security and peace-of-mind to…

Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams

Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams SINGAPORE, August 24, 2016 – As Trend Micro predicted, 2016 has proven to be a year of online extortion through various malicious attack methods. Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader…

Can Internet of Things be the New Frontier for Cyber Extortion?

Did you know that despite being equipped with new applications and hardware, most Internet of Things (IoT) devices are furnished with outdated connection protocols and operating systems (OS)? (this is good) When exploited, it can open up the device to remote access by hackers.…

Trend Micro Partners with INTERPOL in Arrest of Nigerian Cybercriminal Leader

Trend Micro Incorporated, a global leader in security software and solutions, announced its collaboration in the arrest of the head of an international criminal network who was suspected of stealing more than $60 million through business email compromise (BEC) and CEO…

Trend Micro Survey Reveals Less Than 1 in 10 APAC Companies Fully Understand How Cyber Attacks Are Performed

Trend Micro Survey Reveals Less Than 1 in 10 APAC Companies Fully Understand How Cyber Attacks Are Performed ·         Online survey conducted in eight countries across APAC discovers that 59 percent of companies attribute “employees’ lack of cyber security knowledge” as the biggest…

Ransomware is making a comeback, illustrated in numbers

Ransomware is not a new name to cybersecurity companies or businesses that have survived the malware wave 20 years ago, but hearing it again recently definitely puts some experts in shock. Not only has ransomware achieved a revival, it has…

Pokémon Go: Real World Risks of Apps

As the virtual and physical realms collide, the chances of them converging in serious and dangerous methods increases. This is best exemplified by Pokemon GO, Nintendo’s latest smartphone game addition to the widely acclaimed and popular Pokemon franchise. The game employs…

Over Ten Million Ransomware-Related Cyber Threats Detected in Asia Pacific Over the First Five Months of 2016

Over Ten Million Ransomware-Related Cyber Threats Detected in Asia Pacific Over the First Five Months of 2016 ·  More than 500 attacks detected on a daily basis in Singapore alone ·  66 million ransomware threats recorded globally Singapore, July 12, 2016 – Trend…

The Panamanian Shell Game: Cybercriminals With Offshore Bank Accounts?

The recent Panana Papers leak revealed high profile politicians, businessmen and other prominent individuals that were utilizing offshore organizations to cut off tax payment. This then led to the question – would cybercriminals too, utilize offshore organizations to facilitate their activities? According…

Trading bombs for cyber tools: How terrorists use technology to hide their identity and communicate

Trend Micro’s CTO Raimund Genes once said, technology is a tool, and people put it to good or bad use. Cybercriminals have long been abusing legitimate online tools and services. Now, according to Trend Micro’s research, there’s another group that…

Trend Micro discovers two critical vulnerabilities affecting QuickTime for Windows

Apple is pulling support for QuickTime for Windows on the heels of Trend Micro’s Zero Day Initiative’s discovery of two new, critical vulnerabilities affecting the software. Detailed in this blog post, these are remote code execution vulnerabilities that could allow an attacker…

Data Protection Mishap Leaves 55M Philippine Voters at Risk

After a massive data breach leaked the entire database of the Philippines’ Commission on Elections (COMELEC), every registered voter in the Philippines is now susceptible to fraud and other risks. While initial reports have downplayed the impact of the leak, Trend Micro…

Trend Micro 2015 Security Roundup Details Top Breaches, Vulnerabilities and Cyber Underground

Trend Micro 2015 Security Roundup Details Top Breaches, Vulnerabilities and Cyber Underground Singapore, March 9, 2016 – Today, Trend Micro Incorporated (TYO: 4704; TSE: 4704) released its annual security roundup report,“Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies,” which dissects the most significant security…

Trend Micro Cloud App Security Expanding to Integrate with Major Cloud Sharing Services

Trend Micro Cloud App Security Expanding to Integrate with Major Cloud Sharing Services   Now enhances Box, Dropbox and Google Drive with Advanced Threat protection and Data Loss Prevention (DLP)       Singapore, March 2, 2016 – Business cloud users are estimated…

Trend Micro Positioned Furthest in Leaders Quadrant for Completeness of Vision in 2016 Gartner Magic Quadrant for Endpoint Protection Platforms

Trend Micro Positioned Furthest in Leaders Quadrant for Completeness of Vision in 2016 Gartner Magic Quadrant for Endpoint Protection Platforms     Singapore, February 11th, 2016 –– Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software and solutions, today announced placement…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"