web
You’re offline. This is a read only version of the page.
close
  • 🚨 Stay Safe from Scams: Official Trend Micro Guidance & Best Practices

    Scams remain one of the most common issues raised in the Trend Micro Community, especially those involving fake renewal emails, tech‑support impersonation, phishing links, and scam calls or texts.
    This post explains how these scams work, how to recognize them, and what to do if you encounter one.


    ⚠️ Common Scams Reported by Customers

    Based on Community reports and Help Center advisories, the most frequent scams include:


    1. Fake Trend Micro Renewal Emails
      - Scammers send emails pretending to be Trend Micro invoices or renewal notices, often urging you to:
      • Call a phone number to “cancel”
      • Pay immediately to avoid charges
      • Provide payment or personal information

      ✅ Important:
      Trend Micro does not send renewal emails that ask you to call a number or provide payment details by email.

      Learn more:


    2. Tech Support Scam Calls
      - Scammers may call unexpectedly, claiming to be:
      • Trend Micro Support
      • A “certified technician”
      • A partner fixing malware or subscription issues

      They often:

      • Spoof caller IDs
      • Ask for remote access
      • Demand payment for fake services

      ✅ Trend Micro will never make unsolicited support calls. Phone calls are always pre‑scheduled when legitimate.

      Learn More:


    3. Phishing Emails & Malicious Links
      - Phishing messages attempt to trick you into clicking links or opening attachments that:
      • Steal login credentials
      • Install malware
      • Lead to fake websites

      Common signs include:

      • Urgent or threatening language
      • Misspelled sender domains
      • Generic greetings (e.g., “Dear Customer”)

      Learn More:


    4. Scam Text Messages (Smishing)
      - Scam texts often claim:
      • Delivery problems
      • Account suspension
      • Prize or refund notifications
      • They usually contain suspicious links

      Learn More:


    ✅ Best Practices to Protect Yourself from Scams

    Follow these Trend Micro‑recommended safety steps:

    • ❌ Do not click suspicious links or attachments
    • ❌ Do not call phone numbers in unsolicited emails
    • ❌ Never share passwords, PINs, or payment details
    • ✅ Verify renewals only via your Trend Micro Account
    • ✅ Use official Trend Micro websites (trendmicro.com, helpcenter.trendmicro.com)
    • ✅ Keep Trend Micro Security updated

    Related Articles


    🛡️ How Trend Micro Helps Protect You

    Trend Micro products include built‑in protection against scams:

    • Anti‑phishing & Web Protection (blocks fake websites)
    • Email Defender (flags suspicious emails)
    • ScamCheck (analyzes links, numbers, emails, screenshots)

    Learn More About ScamCheck


    🚑 What to Do If You Think You’ve Been Scammed

    1. Stop engaging with the scammer immediately
    2. Disconnect remote access if granted
    3. Change passwords for affected accounts
    4. Scan your device with Trend Micro
    5. Report the scam to Trend Micro Support

    ✅ Final Reminders

    • Trend Micro will never pressure you into urgent payments, request passwords, or make unsolicited support calls.
    • When in doubt, pause, verify, and ask—the Community and Support teams are here to help.

    Continue reading...

  • Printer Compatibility with Trend Micro Security & VPN

    Some customers report that their printer stops working after installing or enabling Trend Micro Security or Trend Micro VPN.
    This post explains why this happens, when it is expected behavior, and how to restore printing safely.

    Why Printing Can Stop When Trend Micro Is Enabled

    Most printer issues fall into two categories:

    1. Local network security controls (Firewall / Network Protection)
    2. VPN‑related network isolation

    These are not random bugs—they are usually the result of how operating systems and networks handle security and traffic isolation.


    Scenario 1: Printer Blocked by Trend Micro Security (Firewall / Network Protection)

    ✅ This is expected security behavior, not a product defect
    Trend Micro Security monitors local network traffic to prevent:

    • Unauthorized device access
    • Lateral movement by malware
    • Exploits using open network ports

    Many printers:

    • Use open or legacy ports
    • Broadcast via network discovery
    • Do not authenticate traffic

    Because of this, the firewall may:

    • Block printer discovery
    • Block print jobs
    • Mark the printer as an unknown device

    Common Symptoms:

    • Printer appears offline
    • Printer not detected on the network
    • Print jobs get stuck or fail
    • Printing works when Trend Micro is disabled

    How Users Can Fix It Safely

    1. Add the printer to the trusted network
      • Ensure the network is set to Private / Home
      • Avoid using Public network mode
    2. Allow printer communication
      • Add printer IP or application to the Exception / Allowed list
      • Allow inbound/outbound local network traffic for the printer
    3. Temporarily test (for diagnosis only)
      • Disable Firewall briefly
      • If printing works, re‑enable Firewall and configure exceptions (Do not leave protection disabled)

    Scenario 2: Printer Not Working When VPN Is Enabled

    ⚠️ This is a known VPN limitation, not a Trend Micro bug
    When a VPN is active:

    • Your device traffic is routed through an encrypted tunnel
    • Local network devices (like printers) may become unreachable

    This behavior is controlled by the operating system’s VPN framework, not by Trend Micro alone.

    Common Symptoms:

    • Printer works when VPN is OFF
    • Printer disappears when VPN is ON
    • Network printer cannot be found
    • Wireless printing fails during VPN connection

    How Users Can Fix It Safely

    • Turn off VPN when printing to a local printer
    • Use USB printing instead of network printing
    • Enable split tunneling (if available) so local network traffic bypasses VPN
    • Use cloud‑based printing features (if supported by the printer)

    What Trend Micro Is Doing

    • Improving device detection and trust flows
    • Reducing false positives for common printer software
    • Enhancing VPN handling during network changes
    • Updating guidance so customers can configure printers safely

    Continue reading...

  • Understanding Trend Micro VPN & App Compatibility

    Trend Micro offers several apps with VPN or VPN‑based protection. However, using multiple Trend Micro apps with VPN features on the same device may cause connection or stability issues. This is because most operating systems allow only one active VPN connection at a time.

    Why Issues May Occur

    When more than one app tries to control a VPN, the system may disconnect the VPN, toggle it on and off, show “connected” with no internet access, or block another VPN from connecting. This behavior is controlled by the operating system and is not unique to Trend Micro.

    Trend Micro Apps That Use VPN Technology

    Full VPN apps:

    • Trend Micro VPN
    • Trend Micro Mobile Security (Web Guard feature)

    VPN‑based protection apps:

    • Mobile Security (iOS Web Guard / Safe Browsing)
    • ScamCheck
    • ID Protection (network‑level protection)

    Best Practices

    • Use only one VPN feature at a time
    • Choose which app controls your VPN based on your priority (privacy, safe browsing, or identity protection)
    • Check VPN permissions and remove duplicate VPN profiles (especially on mobile)
    • Restart the device after changing VPN settings
    • Keep all Trend Micro apps and your OS up to date

    Key Takeaway

    VPN issues usually happen when multiple apps compete for VPN control. Using a single VPN feature ensures better stability and performance.

    Continue reading...

  • 🔒 Password Manager Has Ended — Here’s What You Need to Know

    Hello Password Manager Users,

    We’d like to share an important update about Trend Micro Password Manager. The service has ended, and we want to make sure you’re fully informed.

     

    🧭 What Happened

    Trend Micro ended the Password Manager service on November 16, 2025. The app and all its features (like viewing, saving, and autofilling passwords) is longer available. It will no longer receive updates or support for the app.

    💡 Why We Made This Change

    We’re continuously improving how we protect your identity and personal data. To provide a stronger and more complete protection service, we’ve introduced Trend Micro ID Protection, which replaces Password Manager.

    ID Protection not only manages your passwords—it also helps safeguard your personal information by:

    • Monitoring if your data appears in leaks or breaches
    • Protecting your Wi-Fi connection
    • Offering stronger identity and privacy features
     

    🆕 How to Get Trend Micro ID Protection

    If you’re using one of the following subscriptions, ID Protection is already included—no extra cost needed:

    • Premium Security Suite
    • Personal Protection Suite
    • Security Suite Ultimate
    • Security Suite Pro Plus
    • Security Suite Pro
     

    Questions?

    Drop your questions below, and your Trend Techie Buddy is here to help you out!

     

    Join the discussion!

    Sign in or create an account.

    Continue reading...

  • 🛡️ ID Security Has Ended — Here’s What You Need to Know

    Hello ID Security Users,

    We’d like to share an important update about Trend Micro ID Security. The service has ended, and we want to help you through the transition so you can continue protecting your personal information.

     

    🧭 What Happened

    The app and its features—like checking your email or passwords for leaks on the dark web— is no longer available. You also won’t receive any further updates or support for the app.

     

    💡 Why We Made This Change

    We’re improving how we protect your identity and personal data. The new Trend Micro ID Protection replaces ID Security and offers more comprehensive coverage—beyond dark web monitoring.

    With ID Protection, you can:

    • Monitor if your personal data appears in leaks or breaches
    • Manage your passwords securely
    • Protect your Wi-Fi connection
    • Access enhanced identity protection tools—all in one place
     

    🔄 What You Should Do Next

    To continue protecting your personal information, switch to Trend Micro ID Protection.

     

    🆕 How to Get Trend Micro ID Protection

    If you’re using one of the following subscriptions, ID Protection is already included—no extra cost needed:

    • Premium Security Suite
    • Personal Protection Suite
    • Security Suite Ultimate
    • Security Suite Pro Plus
    • Security Suite Pro
     

    Questions?

    Drop your questions below, and your Trend Techie Buddy is here to help you out!

     

    Join the discussion!

    Sign in or create an account.

    Continue reading...

  • Lost Device Protection for Android Ends Support After October 2025

    Hello Android Users,

    We have some important news for those of you who have been using Trend Micro Mobile Security’s Lost Device Protection to manage lost or stolen devices. Support for this feature has been discontinued. Here’s what you need to know and how you can continue to keep your device secure.

     

    What is End of Support

    When a feature reaches End of Support, it means that it no longer receive updates or assistance from the developer. This is a common part of the software lifecycle.

     

    What Was Lost Device Protection?

    Lost Device Protection has been a crucial feature in Mobile Security, helping users locate lost phones and safeguard their data. It allowed you to remotely trigger actions such as location tracking, alerts, device locking, data wiping, and even capturing photos.

     

    What Happens After Support Ends?

    After you update Trend Micro Mobile Security for Android, the Lost Device Protection feature is no longer available. But don't worry, there are alternative solutions to keep your device safe.

     

    Exploring Alternative Solutions

    To ensure your phone remains protected, we recommend the following alternatives:

    • Google’s Find My Device: This is a reliable tool provided by Google. It allows you to locate your device, play a sound, lock your device, and erase its data if necessary. Access it through the Find My Device website or app.
    • Manufacturer’s Locator Services: Some Android manufacturers, like Samsung, offer their own device locator services with additional features, such as retrieving calls and messages or extending battery life.
     

    What You Should Do Next

    1. Enable Location Services: Ensure your phone’s location services are turned on. This is crucial for any tracking feature to work effectively.
    2. Set Up Google’s Find My Device: If you haven't already, enable and configure Google’s Find My Device by going to Settings > Security > Find My Device and ensuring it is activated.
    3. Explore Manufacturer Services: If your device manufacturer offers its own locator service, set it up and familiarize yourself with its features.
     

    By taking these steps, you can continue to protect your Android device even after the Lost Device Protection feature is discontinued. Stay proactive and keep your device secure!

     

    Questions?

    Drop your questions below, and your Trend Techie Buddy is here to help you out!

     

    Join the discussion!

    Sign in or create an account.

    Continue reading...

  • Lost Device Protection for iOS Ends Support

    Hello Apple Users,

    We have an important update for those of you who have been using Trend Micro Mobile Security’s Lost Device Protection to manage lost or stolen devices. By October 2025, support for this feature will be discontinued. Here’s what you need to know and how you can continue to keep your iPhone secure.

     

    What is End of Support

    When a feature reaches End of Support, it means that it will no longer receive updates or assistance from the developer. This is a standard part of the software lifecycle and helps developers focus on enhancing other features and services.

     

    What Was Lost Device Protection?

    Lost Device Protection has been a valuable feature in Mobile Security, helping users locate lost iPhones and safeguard their data. It allowed you to remotely trigger actions such as location tracking, alerts, device locking, data wiping, and even capturing photos.

     

    What Happens After Support Ends?

    After updating Trend Micro Mobile Security for iOS, the Lost Device Protection feature will no longer be available. But don’t worry, Apple has you covered with its robust, built-in solution.

     

    Exploring Alternative Solutions

    To ensure your iPhone remains protected, we recommend using Apple’s built-in Find My feature. This powerful tool allows you to:

    • Locate your device on a map.
    • Play a sound to help find your device nearby.
    • Lock your device remotely to protect your information.
    • Display a custom message with your contact number.
    • Erase all the data on your device if necessary.

    You can access Find My through the Find My app or via iCloud.com.

     

    What You Should Do Next

    1. Enable Location Services: Make sure your iPhone’s location services are turned on. This is crucial for any tracking feature to work effectively. You can do this by going to Settings > Privacy > Location Services and ensuring it is turned on.
    2. Set Up Find My: If you haven’t already, enable and configure Find My. Here’s how:
      1. Go to Settings.
      2. Tap your name at the top, then select Find My.
      3. Tap Find My iPhone and ensure it is turned on.
      4. Enable options like Find My network and Send Last Location for additional functionality.
     

    By taking these steps, you can continue to protect your iPhone even after the Lost Device Protection feature is discontinued.

     

    Questions?

    Drop your questions below, and your Trend Techie Buddy is here to help you out!

     

    Join the discussion!

    Sign in or create an account.

    Continue reading...

  • Trend Micro Check 2.0 – June 2025 Release Notes

    To deliver stronger scam protection and a better user experience, we’ve released the latest update to Trend Micro ScamCheck on both Android and iOS platforms.

    Release Details

    • Google Play: 2.0.2135
    • App Store: 2.0.1976

    What’s New

    New Feature Alert: Scam Radar!

    Scam Radar introduces a smarter and more proactive way to spot scams, even the subtle ones that aren’t easy to catch. It goes beyond simple keyword checks and looks at the bigger picture to protect you before threats cause harm. How it works:

    • Smart Analysis: Uses advanced AI to detect hidden scam tactics like fear-based messaging, urgency tricks, or fake authority.
    • Real-Time Monitoring: Works quietly in the background, scanning calls, texts, and websites. To activate it, make sure Call Block, SMS Filter, and Web Guard are turned on.
    • Personalized Alerts: If something suspicious is found, you’ll get a clear, customized warning with recommended actions — like blocking a number or deleting a risky message.

    New Onboarding Flow

    We’ve redesigned the onboarding process to make it easier to understand and enable key ScamCheck features. Whether you're a new or existing user, setup is now quicker and more intuitive — including Call Block, VPN/Web Guard, and SMS Filter.

    Revamped Homepage with Scam Radar Insights

    The updated homepage now displays Scam Radar activity based on your usage and scam exposure. You’ll also see:

    • Which protection features are currently enabled
    • The top 3 scams trending in your region
    • Scam types identified in early stages

    Continue reading...

  • iOS 19 (aka iOS 26): Which iPhones Are Still Supported?

    Apple recently announced iOS 26 (originally expected as iOS 19).


    Which iPhones are compatible with this update?

    If you're wondering whether your device made the cut, here's a quick summary:

    ✅ iPhones That Support iOS 26

    • iPhone 11 and newer (including iPhone 12, 13, 14, 15)
    • iPhone SE (2nd and 3rd generation)

    ❌ iPhones No Longer Supported

    • iPhone XR
    • iPhone XS / XS Max

    Why This Matters

    New iOS versions usually include major security improvements and privacy features. If your device isn’t compatible, it means:

    • You’ll stay on the previous iOS version (likely iOS 18)
    • You might miss out on future privacy protections and advanced threat detection
    • You may need extra security tools to stay protected

    Stay Protected

    Whether you're upgrading to a new iPhone or sticking with your current one, it’s a good time to review your mobile security setup. Visit the Trend Micro Community to:

    • Get tips for securing older iPhones
    • Discuss the latest privacy features in iOS 26
    • Ask questions and share your upgrade plans

    Questions?

    Drop your questions below, and your Trend Techie Buddy is here to help you out!


    Join the discussion!

    Sign in or create an account.

    My Trend Micro Account - Access features and subscriptions Sign in to your Trend Micro Account to access the security features under your license, and to manage your consumer software subscriptions.

    Continue reading...

  • Looking Up Cathay Pacific Baggage Allowance? Here’s How to Avoid Fake Travel Sites

    Planning a trip with Cathay Pacific and want to check your baggage allowance? You’re not alone as it’s one of the most searched travel questions online. But while searching, watch out: scammers are creating fake airline websites and customer service pages to trick travelers.


    Why This Matters

    Scammers know that people often search for things like "Cathay Pacific baggage policy" or "how much luggage can I bring?" They create lookalike sites that ask for personal info, payment details, or even trick you into calling fake hotlines.


    How to Stay Safe While Searching Travel Info

    • Always go directly to the official website: For Cathay Pacific, that’s cathaypacific.com.
    • Avoid clicking on ads for baggage allowance: Scammers sometimes buy ad space on search engines.
    • Don’t trust “customer service” numbers from unknown sites: These could lead to phone scams.

    Bonus Tip: Watch Out for Fake Email Confirmations

    Some scammers send fake booking or baggage fee emails claiming to be from Cathay Pacific. If you receive one, don’t click any links — check your official booking account instead.


    Need Help Spotting a Fake Travel Site?

    Sign in or create an account. to share screenshots or links you’re unsure about. Our cybersecurity experts and community members can help you stay safe while planning your trip.

    Continue reading...