There are privacy and security risks involved in connecting to public or 'free' Wi-fi hotspots. Here's a 4-step guide to setting up a virtual private network (VPN) for the times when you have to connect to unfamiliar networks.
Don't assume that iOS is safe from malware and attacks. Previous incidents have proven that it's not as safe as you thought. Here are a few ways to tighten up security on your iOS device.
How can you secure your Android device? Here are simple security tweaks you can do right now to make sure that your device—and the data in it—is protected:
BYOD networks can benefit both the workers and the company, but it also presents a number of potential risks. This infographic details the challenges of balancing employee freedom, functionality, and security on BYOD.
While Facebook is still the go-to place for many social purposes, newer social apps make it convenient for teens to capture and share fresh and fleeting moments. Get the latest tips on how to help your teen use them safely.
The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.
A flaw that affects iOS devices has been discovered that allows nearby attackers to send apps, and even cause infinite reboot cycles on the iOS devices they run on, rendering them temporarily useless.