Trend Micro Archives - Page 4 of 7 - The Tech Revolutionist
Trend Micro Market Leader in Server Security Market for Sixth Consecutive Year

Trend Micro Market Leader in Server Security Market for Sixth Consecutive Year According to latest report, Trend Micro share outpaces the market, growing to 30.3%   Singapore, January 19, 2016 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software solutions, today…

Trend Micro : Android-based Smart TVs Hit By Backdoor Spread Via Malicious App

With the year-end shopping season over, many consumers now have various new smart gadgets in their homes – one particularly popular gadget being smart TVs. These TVs are more than just passive display devices; many of them can even run Android apps as well.…

Trend Micro and ASUS Partner to Deliver A New Level of Smart Home Security

Trend Micro and ASUS Partner to Deliver A New Level of Smart Home Security ASUS Smart Home Gateway, embedded with the Trend Micro SDK, makes connected environments safer in smart homes Singapore, December 2, 2015 – According to Business Insider, Internet of…

Prototype Nation, The Chinese Cybercriminal Underground in 2015

By the end of 2013, the Chinese cybercrime underground was a very busy economy, with peddled wares that not only targeted PCs, but mobile devices as well—making it its most prolific segment. We also saw cybercriminals abusing popular Web services such…

Trend Micro Q3 Security Roundup Report Showcases Vulnerabilities and Aftermath of Data Breaches

Trend Micro Q3 Security Roundup Report Showcases Vulnerabilities and Aftermath of Data Breaches Cracks in the mobile ecosystem, Internet-connected devices and network infrastructure are highlighted Singapore, November 18, 2015 – The interconnectivity of technology has led to a point where many devices…

Trend Micro 2016 Threat Predictions Forecast an Uptick in Online Extortion and Hacktivism

Trend Micro 2016 Threat Predictions Forecast an Uptick in Online Extortion and Hacktivism Sophisticated threat landscape reinforces need for regulatory requirements & cybersecurity officers SINGAPORE, October 29, 2015 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software and solutions, today…

Trend Micro Acquires HP TippingPoint, Establishing Game-Changing Network Defense Solution

Trend Micro Acquires HP TippingPoint, Establishing Game-Changing Network Defense Solution Combines next-generation IPS with industry-leading breach detection Singapore, Oct. 21, 2015 – Trend Micro International (TYO: 4704; TSE: 4704), a global leader in security software, signed a definitive agreement to acquire HP TippingPoint, a leading provider…

The Japanese Underground: Japan’s Unique Cybercriminal Economy

The Japanese Underground: Japan’s Unique Cybercriminal Economy View research paper: The Japanese Underground Even in Japan, where daily life is guided by law, discipline, and traditions, cybercrime rears its ugly head. Imagine a young man, 17 years of age. Imagine…

Trend Micro CLOUDSEC 2015 Discussions Summary

Themed “Expect the Unexpected” Rik Ferguson, VP for Security Research, Trend Micro, delivered a key note on the future of cyber threats and its potential to lead to technology disruption and chaos. The presentation followed with a panel discussion which…

Trend Micro Q2 2015 Roundup Finds New Threats to Public Sectors

Trend Micro Q2 2015 Roundup Finds New Threats to Public Sectors Public utilities, government attacks and targeted threats dominate the quarter SINGAPORE August 25, 2015– The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more…

Trend Micro Discovers Vulnerability That Renders Android Devices Silent

Trend Micro has recently discovered a vulnerability in Android that can render a phone apparently dead – silent, unable to make calls, with a lifeless screen. This would mean there’d be no ring, text or notification sounds. This vulnerability is present from…

How To Avoid Being In The Little Black Book Of Shame

The Ashley Madison hack has resulted in a possible exposé of the biggest black book to name and shame in history. Given the sheer mess that Ashley Madison users are going to be tangled up in, it’s proving to be a tough case…

Trend Micro Casts Light into the Shadows of the Deep Web

Approximately 400 times larger than the visible Web, the Deep Web is also home to many of the Internet’s illicit activities such as identity theft, doxing, firearm trading and employing contract killers. Some may be familiar with the “Dark Web” or “darknets”: but these are…

7 Simple Tips To Secure Your Android Devices

Android has a stranglehold on the smartphone market worldwide. According to Strategy Analytics, Android dominated the global smartphone market again last year with 1 billion units shipped worldwide, accounting for 81 percent of all smartphones shipped last year. Without a doubt, Android is…

Nigerian Cybercriminals Use a Cheap and Simple Keylogger to Prey on SMBs Worldwide

Social engineering is emerging as one of the most prolific and effective methods that cybercriminals use to deceive victims, and now it’s being leveraged by scammers, traditionally reliant on basic spamming emails, who are evolving to more sophisticated methods. In…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"