Trend Micro

Trend Micro News

YouTube served malicious advertisements, Trend Micro says

The advertisements redirected victims to the Sweet Orange exploit kit, which tries to install malware read more »

HTC ships Desire 510 with 64-bit processor, but isn't sure users can take advantage of it

The smartphone will be available in both the U.S. and Europe read more »

Netcore, Netis routers have hardcoded password, Trend Micro says

More than two million of the devices on the Internet may be vulnerable read more »

Firms with best apps tend to use external developers, survey finds

IaaS, PaaS and API-first organisations tend to be the best at producing apps, says API platform provider Apigee read more »

'Reveton' ransomware upgraded with powerful password stealer

Avast thinks its controllers are trying to diversify after profits have fallen read more »

Symantec, Kaspersky deny government ban in China

Both security vendors said they can still sell to Chinese government agencies read more »

more news ..
Trend Micro Blogs

New ARM-based Moonshot servers from HP exemplify workload-specific computing

HP promises 35 percent cost savings for targeted workloads read more »

Intel's role in the future of software-defined infrastructure

Intel led the hardware standardisation revolution. It should do the same for software defined infrastructure read more »

The Forrester Wave: Enterprise Business Intelligence Platforms, Q4 2013

Making sense of a crowded market read more »

How to make sure you don't end up with a Snowden-sized security leak

Risky business outsourcing.... read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Trend Micro In Depth

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

iPhones chipping away at BlackBerry enterprise stronghold

iPhones will beat out BlackBerry devices in the enterprise this year, IDC says, thanks in part to the "Bring Your Own Device" trend - Or has it happened already? read more »

A balanced BYOD policy is better all round

Tying down the tablets read more »

BYOD to decline in 2013 as enterprise mobility grows?

BYOD cost savings and greater worker productivity are myths, says one researcher - BYOD will get a reality check in 2013 read more »

Power efficiency a growing concern in the data centre and for end users

Energy consumption is at the forefront of IT as industry leaders seek to lower costs and, for the more altruistically inclined, save the planet at the same time read more »

Microsoft SharePoint 2013 - How good is new office collaboration suite?

Microsoft takes up such major trends as cloud readiness, social collaboration and mobility with SharePoint 2013. The ultimate goal is a uniform user experience read more »

more in depth ..
Trend Micro Slideshows

Intel showcases the tech trends of tomorrow

Print your own robot and cars that understand what you say read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

New security tools protect virtual machines

Product test reveals differences between Reflex, Catbird, Beyond Trust, Hytrust and Trend Micro read more »

Information technology: It's not just a guy thing

Nine women who found great careers in high tech read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open