First time on my blog "Trend Internet Security?" Want to know more about Internet Security? Need some cool advices and modern Trend Internet Security tips&tricks?

Subscribe to blog updates by Email or RSS

Each week you will get a new post with a fresh tip concerning Trend Internet Security. I promise you, my dear reader! Or you will unsubscribe :-)

Tuesday, May 25, 2010

Trend Micro Bundles Consumer Internet Security With Identity Protection and Laptop Theft Recovery Services

Trend Micro teams with IdentityTruth and Absolute Software to deliver computer protection for consumers in one retail package.

CUPERTINO, Calif., May 24 /PRNewswire/ -- Trend Micro announced today a new retail consumer bundle that includes identity protection and laptop theft recovery services for a comprehensive set of consumer security products in one package. The security bundle will offer:

* A one-year subscription of Trend Micro™ Internet Security Standard, which guards against viruses, spyware, spam, Trojans, rootkits, and emerging online security threats.
* A one-year subscription of Computrace® LoJack® for Laptops by Absolute® Software, a provider of firmware-based, patented, computer theft recovery, data protection and secure computer lifecycle management solutions.
* A one-year subscription of identity theft prevention and identity protection monitoring services from identityTruth®, including certified specialist assistance with replacing lost or stolen identification and the remediation of a stolen or compromised identity.


Computrace LoJack for Laptops is powered by the patented Computrace technology from Absolute Software. LoJack for Laptops is virtually undetectable and calls home to the Absolute Monitoring Center with location information. If a computer is reported stolen, the Absolute Theft Recovery Team can gather evidence from the computer to identify the thief's location and works with local police to recover the computer. As an added layer of security, Premium customers can remotely delete data from the stolen computer to help protect their personal information.

IdentityTruth's unique Faster than Fraud™ technology combines data from many different sources -- going beyond simple credit-based protection to deliver a more complete picture of an individual's identity risk. The service continuously combines and analyzes any and all information that is discovered specific to an individual to detect, predict, and alert consumers to suspicious activities, identifying potential identity fraud patterns before fraud happens and providing concrete next-steps to resolve a problem that may arise.

Trend Micro Internet Security provides simplicity and speed when it comes to powerful online protection. It leverages the Trend Micro™ Smart Protection Network™ infrastructure, which works in the background, correlating threat intelligence, protecting in the Internet cloud, and giving consumers -- wherever they are -- immediate, real-time protection competitive products don't offer.

"In today's mobile and connected world, our computers become an extension of our lives. We must protect these valuable assets from internet threats and from data and device theft," said Mark Grace, vice president of consumer business at Absolute Software. "We're excited to be bundled in this offering, and at an attractive price, it provides consumers with the critical security features needed to confidently embrace the power of their mobile devices."

"Financial transactions are no longer limited to the personal desktop computer. Today's consumers use laptops and mobile communication devices for online banking and shopping, to store financial documents, tax returns and more – all of which can put consumers at greater risk of identity theft," said Steven Domenikos, CEO of IdentityTruth "Our partnership with Trend Micro is bringing best-in-class protection to consumers in one retail package."

Pricing and Availability

The retail bundle of one-year subscriptions of Trend Micro Internet Security Standard, IdentityTruth's proactive identity monitoring services, Computrace® LoJack® for Laptops by Absolute® Software is available at Best Buy and www.bestbuy.com for MSRP US $89.99.

About IdentityTruth

IdentityTruth is the leading provider of a new breed of service to help consumers safeguard their Privacy and Identity. IdentityTruth's proprietary technology provides subscribers with advance notice of potential identity fraud so they can take better control to stop it before it becomes costly. IdentityTruth not only detects -- but can actually predict -- possible problems, and that is what makes IdentityTruth Faster than Fraud™. IdentityTruth is a privately-held, VC-funded company headquartered in Waltham, Massachusetts. Investors include Argonaut Ventures and Stata Venture Partners. For more information, go to www.IdentityTruth.com or call 781-684-1300.

About Absolute Software

Absolute Software Corporation (TSX: ABT) is the leader in tracking, managing and protecting computers and mobile devices. The Company's Computrace, Absolute Manage and LoJack® for Laptops solutions provide theft recovery, data protection and computer lifecycle management capabilities to organizations and consumers. The Company's software agent is embedded in the firmware of computers by global leaders, including Acer, ASUS, Dell, Fujitsu, General Dynamics Itronix, HP, Lenovo, Motion, Panasonic and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute Software, visit www.absolute.com and http://blog.absolute.com.

About Trend Micro:

Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro™ Smart Protection Network™ infrastructure, a next-generation cloud-client innovation that combines sophisticated cloud-based reputation technology, feedback loops, and the expertise of TrendLabs(SM) researchers to deliver real-time protection from emerging threats. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.

Computrace and Absolute are registered trademarks of Absolute Software Corporation. LoJack is a registered trademark of LoJack Corporation, used under license by Absolute Software Corporation. LoJack Corporation is not responsible for any content herein.


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Saturday, May 1, 2010

Symantec confirms acquisition of PGP, winner of SC Magazine's information security vendor of the year

Symantec has made major moves this week to strengthen its product portfolio with the acquisition of both PGP and GuardianEdge.

Under the terms of the agreements, Symantec will acquire PGP for a purchase price of approximately $300 million in cash and GuardianEdge for a purchase price of approximately $70 million in cash. Earlier this week PGP was named as information security vendor of the year at the SC awards, and also won best encryption solution for PGP Whole Disk Encryption and the innovation award for PGP Portable.



The agreements are subject to customary closing conditions, including regulatory approvals, and are expected to be completed during the June quarter. Upon close of the acquisitions, PGP and GuardianEdge will join the Symantec Enterprise Security Group led by senior vice president Francis deSouza.

The acquisitions will see Symantec establish itself firmly in the encryption sector. It claimed that by bringing together PGP and GuardianEdge's standards-based encryption capabilities for full-disk, removable media, email, file, folder and smartphone, with Symantec's endpoint security, data loss prevention and gateway security offerings, Symantec will have the broadest set of integrated data protection solutions.

Following the close of these transactions, Symantec intends to bring together key features and functionality from each company's offerings and standardise on the PGP key management platform in order to deliver centralised policy and key management capabilities across the entire suite of encryption solutions.

Symantec also confirmed that it intends to integrate the PGP key management platform into its Symantec Protection Center, which simplifies security information management by providing customers consolidated access to threat, security and operational dashboards and reporting.

It also said that integrating the PGP key management platform into the Symantec Protection Center will further enhance the management of endpoint security, data loss prevention and gateway security products, which are also integrated with Symantec Protection Center, allowing customers to more seamlessly protect information.

DeSouza said: “As information becomes increasingly mobile, it's essential to take an information-centric approach to security. With these acquisitions we can further protect information by using encryption in an intelligent and policy-driven way to give the right users access to the right information, enabling the trust that individuals and organisations need to operate confidently in an information-driven world.”

Source: scmagazineuk.com


Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE

Thursday, January 28, 2010

Zamzom




Like this post?

Why not to Subscribe to Trend Internet Security news by Email for FREE

What Is Your Opinion About Spy Camera?

Hidden camera is very common is modern life.
If you are planning to fit a supervision camera in your residence or in your working area it is wise to study your states privacy rule & regulations and consider area where you may possibly be in violation, which might consequence in huge fines and/or a prison sentence. It is illegal to set up secret or hidden security cameras in part which is considered to be a confidential place.



United States privacy rules classify a secretive place as everyplace one is capable of is assumed to be out of harm's way from unlawful surveillance. This comprises of areas such as locker rooms, changing stalls, restrooms, bedrooms and lodge rooms. This means that you cannot put in a hidden security camera or voice recording or hearing devices in these areas without prior written down authorization from the person. State regulation regarding security cameras is not standardized across the board. Merely a very few in number of them have regulation concerning hidden camera setting up. Some places like California, Delaware, Georgia, Hawaii, Alabama, Arkansas, Maine, Michigan, Minnesota, New Hampshire, South Dakota, Kansas and Utah.

In nearly all cases facts collected by means of hidden video cameras will still be permissible in a law court if a offense is committed whether authorization was approved or not. Whereas it might be against the law to install a security camera in a vend store dressing room, video recording capturing shoplifters in these areas is still often used to act against unlawful acts. The two circumstances hidden watching is measured against the law are when the possessor of the place has not approved surveillance, or the recorded video/audio is use for banned means.



Privacy law and the utilization of out of sight security cameras is at this time an area of most important argument. This technology has enhanced rapidly in a period of last 10 years and regulations are still being advanced to deal with its execution. Tools that were previously merely obtainable to high end rule enforcement and government spy and are now capable to be buy by everyone. A completely well-designed wireless security camera setup together with transmitter, receiver, or built in records storage can be acquire for as little as $50. This twofold edged sword has permitted persons and business an intelligence of security beforehand unfeasible, but the trouble-free installation of wireless security cameras have also set way to noteworthy mistreatment. Investigation has exposed that even a large portion of legalized security cameras are often used for voyeuristic purpose.

Regrettably they manner it sits at once there is extremely little that can be made to stop people from setting up unlawful spy camera. As a business or proprietor you can remain yourself out of problem by scrutiny your state laws or consulting a private researcher or public prosecutor about your security system association.
It might not be the smallest camera we've ever seen, but the Fake Car Key Spy Camera definitely would be a nice stocking stuffer for an Inspector Gadget in training. The camera is designed to look like a remote device that unlocks a car, shoots video at 29-frames-per-second, snaps photos at a resolution of 1600 x 1200 pixels and records sound, too. There's also a slot for a MicroSD card so you can share your voyeuristic, er... spy vids with buddies. All for $63, and Brando even throws in an 8 gigabyte card for the extra paranoid.

Could you really get away with sneaking pics and videos with this thing? The pinhole-sized lens might not be noticeable, but subjects might wonder why you're pointing a car key remote at them. The only place you'll be able to use this unsuspectingly is in a parking garage. Even then, how long could a person pretend to forget where he parked his car?



Like this post?

Why not to Subscribe to Trend Internet Security news by Email for FREE

Saturday, October 31, 2009

Trend Internet Security Tips: Block Hackers and Viruses

When you are connecting to the Internet using your home or office PC without antivirus and firewall software installed, you're risking the same way if you leave your front door unlocked while going on a vacation.



Probably, if you're very lucky, nobody will enter this door for some reason. :-)

All we know that any of us can leave keys in a car. That's fault of ours and very good point to remember for car thief beginners.




Like this post?

Why not to Subscribe to Trend Internet Security news by Email for FREE