We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Trend Micro

Trend Micro News

Heartbleed flaw affects mobile apps, too

Many banking, mobile payment apps connect to servers vulnerable to OpenSSL flaw, says Trend Micro read more »

Cybercriminals use sophisticated PowerShell-based malware

Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers read more »

Amazon's WorkSpaces becomes generally available

But Amazon has to overcome questions regarding software integration, security and availability to succeed, according to analyst read more »

New BitCrypt ransomware variant distributed by bitcoin stealing malware

Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied read more »

Rogue apps could exploit Android vulnerability to brick devices, researchers warn

The only way to recover from such an attack involves wiping all user data from affected devices, researchers from Trend Micro said read more »

No special treatment for China on XP, patches end April 8 in the PRC, too

After users wonder if they'd fallen into Bizarro World, Microsoft clarifies security announcement from its China operation read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Trend Micro In Depth

iPhones chipping away at BlackBerry enterprise stronghold

iPhones will beat out BlackBerry devices in the enterprise this year, IDC says, thanks in part to the "Bring Your Own Device" trend - Or has it happened already? read more »

A balanced BYOD policy is better all round

Tying down the tablets read more »

BYOD to decline in 2013 as enterprise mobility grows?

BYOD cost savings and greater worker productivity are myths, says one researcher - BYOD will get a reality check in 2013 read more »

Power efficiency a growing concern in the data centre and for end users

Energy consumption is at the forefront of IT as industry leaders seek to lower costs and, for the more altruistically inclined, save the planet at the same time read more »

Microsoft SharePoint 2013 - How good is new office collaboration suite?

Microsoft takes up such major trends as cloud readiness, social collaboration and mobility with SharePoint 2013. The ultimate goal is a uniform user experience read more »

Behind the scenes with Samsung's Chinese factory girls

Faced with limited opportunities, young women choose electronics manufacturing for the relatively high salaries read more »

more in depth ..
Trend Micro Slideshows

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

New security tools protect virtual machines

Product test reveals differences between Reflex, Catbird, Beyond Trust, Hytrust and Trend Micro read more »

Information technology: It's not just a guy thing

Nine women who found great careers in high tech read more »

The wannabe iPad killers

Android leads as the competitors' tablet operating system, but some use Windows read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open