Trend Micro launches Android security app
Trend's Android security application offers a number of features including download protection and call filtering.
Trend Micro has introduced an Android security app as it looks to ramp up efforts in the mobile sphere.
The Trend Micro Mobile Security app promises to be one of many such offerings from the vendor and focuses on protecting digital files and banking transactions over Android smartphones.
Other features include download protection, call and text filtering as well as 'safe surfing' to help counter phishing efforts.
"Trend Micro has a proven track record of being a long-time leader in the mobile security market, from protecting Windows Mobile 2003 devices to our recent Trend Smart Surfing iPhone application," said Carol Carpenter, general manager of Trend Micro consumer and small business.
"With the Android platforms rapid growth, cyber criminals will be rushing to take advantage of these mobile devices anyway they can."
Trend uses cloud-based security intelligence to help protect Android users from today's threats in real-time.
Given the number of threats which have targeted the Google Android operating system, users may do well to invest in some extra protection.
Last month, research from AdaptiveMobile suggested malware aimed at the OS had quadrupled in 2010 in comparison to 2009.
Meanwhile, Google said it would issue a fix for an Android bug that saw text messages sent to the wrong recipients, albeit in a small number of cases.
"It took us some time to reproduce this issue, as it appears that it's only occurring very rarely," explained Nik Kralevich, an engineer on the Android security team, posting on a forum.
"Even so, we've now managed to both reproduce it and develop a fix that we will deploy."
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now