Risk
9/6/2013
04:14 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Trend Micro Releases Titanium Security 2014

Password management feature includes a secure browser to conduct safe online commerce

CUPERTINO, Calif., Sept. 5, 2013 - The social media privacy management tool is featured in today's release of Trend Micro's Titanium&trade 2014 family of consumer security products. Titanium Security 2014 is a customizable security solution built on Trend Micro's 25 years of leadership in Internet security.

Titanium Security 2014 solutions provide industry-leading, anti-virus and Web-threat protection that identifies and blocks dangerous links in websites, social networks, emails and instant messaging. It also detects spam emails containing phishing scams that can trick users into revealing private personal information. According to the August 2013 AV Comparatives report, Trend Micro Titanium offers the broadest combination of privacy and Web threat protections for Facebook, Google+, and Twitter across PCs and Macs among 31 security products reviewed (Social Network Protection Review, August 2013, AV Comparatives).

Trend Micro has expanded its unique social network privacy technology, which identifies privacy settings that may leave personal or inappropriate information publicly available or vulnerable to identity theft. Trend Micro also gives users control over which apps can access biographical data, and who can tag and see photos. These features are critical today, considering only 24% of Facebook users change their privacy settings each month or more often, according to the same survey of social media users. The same poll showed that 27% of Twitter users and 30% of Google+ users have never checked their privacy settings and 34% of Twitter users and 39% of Google + users have never updated their privacy settings. Trend Micro's robust personal privacy management tool now dramatically simplifies privacy settings on Twitter and Google+, and Facebook – for both Mac and PC. Facebook settings can also now be managed on-the-go via an Android app.

To help fight identity theft, Trend Micro's password management feature in Titanium Security 2014 includes a secure browser to conduct safe online commerce that is specifically designed to support secure online banking. Based on users from the same poll, respondents have an average of 12 accounts requiring passwords, but are using only eight passwords among those dozen accounts. An identify thief can do more damage to a victim that uses the same password in multiple accounts.

Additionally included in Trend Micro's customized solutions are robust parental controls to help families protect children from the dangers inherent to Internet use. Titanium Security 2014 empowers parents to restrict and filter their children's online access, protecting them from inappropriate or harmful websites. In addition, the security solution includes a way to monitor kids' behavior online – to help parents protect their kids from cyber bullying and encounters with online predators.

For Android smartphone and tablet users, Titanium Security 2014 includes the Facebook privacy management app within the Trend Micro&trade Mobile Security. Mobile Security is designed to find a lost or stolen device, identify data-stealing mobile apps, back-up and restore data stored on a device, and remotely lock and wipe out data.

"Life is difficult enough without having to worry whether or not your reputation, your data or your identity is protected," says Omikawa. "Trend Micro tackles this enormous challenge with Titanium Security 2014. This comprehensive solution provides users with all-in-one protection on PCs, Macs and mobiles devices for practically everything you do online, so you can enjoy your digital life safely."

For more information on Trend Micro Titanium Security 2014, go to: http://www.trendmicro.com/us/index.html

About Trend Micro

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro&trade Smart Protection Network&trade infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web