*** Update 2010.07.27 This event/giveaway is officially closed. *** Update 2010.07.26 This deadline of submission of test scripts is today 7/26 (GMT+8), so this promo will end soon. *** Titanium is Trend Micro’s next generation desktop security product that uses the Trend Micro Smart Protection Network and it will be launched very soon. Trend Micro […]

Read more

FakeAV, Rogue AV, Rogue Antivirus, Fake Antivirus, Rogue Security Software, Scareware. Different Security Vendors call them by different names. Simply put, these FAKEAV’s are malicious programs and software packages that mislead users by mimicking legitimate antivirus (AV) programs and giving false warnings (that the machine/ PC that they are using are infected by malware, viruses, […]

Read more

Hayley Nicole Williams is the lead vocalist of the band Paramore. I’ve heard obscure stories and reports that she lost her phone and/or her twitter account was hacked recently and as a result some scandalous pics of Hayley Williams was posted in twitter and twitpic and is now available the Internet. I also read some […]

Read more

Everybody here in RSA 2010 are talking about the Cloud and Cloud Security!!! Whooah! I’m very glad that my company (Trend Micro)  have a good head-start on this topic!!! (trying to relive my FUNtastic skit adlibs) I would like to share some random pics I shot In the RSA 2010 Conference here at the Moscone […]

Read more

It’s been a while since I last posted a tech and security related  post. So let me start the year by posting this useful note. I got some notification that an Adobe update is available on their website. I remembered from the malware blog entry that they (Adobe) have an unpatched 0-day being used by […]

Read more

Note: The article below was published in TrendLabs Malware Blog on November 23, 2009. Spoofed Trend Micro Email Leads to Phishing Site by Menard Osena (Solutions Product Manager) Trend Micro threat analysts recently unearthed spammed messages that purported to have come from Trend Micro. Targeting trusted organizations is not an uncommon technique, used by cybercriminals […]

Read more