{"id":1413,"date":"2005-05-10T00:00:00","date_gmt":"2005-05-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/10\/trend-micro-snaps-up-anti-spyware-firm\/"},"modified":"2021-12-30T11:39:20","modified_gmt":"2021-12-30T11:39:20","slug":"trend-micro-snaps-up-anti-spyware-firm","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/10\/trend-micro-snaps-up-anti-spyware-firm\/","title":{"rendered":"Trend Micro snaps up anti-spyware firm"},"content":{"rendered":"<p>Antivirus company Trend Micro spending an estimated $15m (\u00a38m) to buy an anti-spyware company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>InterMute is being bought just days after Trend Micro said it would sell its own anti-spyware technology to cut communication links between hackers and the computers they have compromised.<\/p>\n<p>Spyware, such as password-stealing keyloggers, secretly sends personal information back to whoever planted it.  Such software has been used to steal identity and banking information, and was implicated in a foiled bank robbery earlier this year.<\/p>\n<p>According to press statements, InterMute&#8217;s products will be sold under the Trend Micro brand and will later be integrated into its software.  Trend Micro said the acquisition would let customers manage &#8220;grayware&#8221; &#8212; programs that cross the boundary of spyware and adware.<\/p>\n<p>&#8220;Spyware continues to evolve and cause concern and damage, but not all spyware can be handled the way viruses and worms are,&#8221; said Eva Chen, co-founder of Trend Micro.  &#8220;Customers need effective solutions to remove spyware, but must also be given the flexibility on how to manage it.  We expect to deliver combined solutions to market quickly.&#8221;<\/p>\n<p>http:\/\/news.zdnet.co.uk\/internet\/security\/0,39020375,39197834,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1413","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1413"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1413\/revisions"}],"predecessor-version":[{"id":3900,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1413\/revisions\/3900"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}