Help Center

Cybersecurity
Learning Center

Learn beyond Cybersecurity. Discover topics covering safe internet use, online privacy, digital identity, and device care. Stay safe, informed, and productive.

public wifi icon

📌 Spotlight: All-in-One Identity, Password, and Privacy Controls

Reclaim your online privacy with Trend Micro ID Protection. Scan the internet and the dark web for mentions of personal information, safeguard your social media accounts, block threats, and receive identity theft support.


Privacy and Identity

Your Digital Persona Matters - Safeguard Your Online Presence and Identity

 
hacking icon

How to change Instagram Password

Know how to securely change or reset your Instagram password.

hacking icon

What is Hacking?

Hacking is like finding a secret way into computers without asking for permission.


iphone hacker icon

What is Device Hacking?

Device Hacking is an unauthorized access to devices.

social media hacking icon

What is Social Media Hacking?

Social Media Hacking is an unauthorized access to social media accounts.


phone number leak icon

What is a Phone Number Leak?

A phone number leak is when private phone numbers are inadvertently made public.

hacked email address icon

How to recover hacked emails

Has your email been hacked? Learn how to recover your compromised accounts.


info leak icon

What to do if your info is leaked

Know the signs of a compromised account and the necessary steps to take.

hacking icon

How to change Facebook Password

Know how to securely change or reset your Facebook password.


More about Privacy and Identity ➜

Fraud and Scams

Protect Your Wallet and Peace of Mind - Detect and Avoid Online Scams and Frauds

 
scam email icon

What is a Scam Email?

A scam email aims to trick recipients into giving up their sensitive information.

social engineering icon

What is Social Engineering?

Bad guys often pretend to be trusted people through social tricks to gain profit from victims.


spam text icon

How to block spam texts on Android

Block spam texts to keep you safe from harmful or annoying messages.


spoofing icon

What is Spoofing?

Spoofing occurs when an attacker pretends to be someone else to access the victim's information.

sextortion icon

What is Sextortion?

Sextortion is a blackmail using explicit content.


More about Fraud and Scams ➜

Productivity

Efficiency Meets Ease - Tips for Boosting Online Productivity

 
delete temporary files icon

How to delete temporary files

If you are running low on space, clear temporary files to free up extra storage.

cache and cookie icon

How to clear cache & cookies on PC

Clear cache and cookies to avoid performance and privacy issues.


clean Other Storage icon

How to clean Mac's Other Storage

Clean Other Storage to gain more space and improve performance.


remove Search Marquis icon

How to remove Search Marquis

Get rid of Search Marquis to improve Mac performance.

remove Bing Redirect icon

How to remove Bing Redirect

Get rid of Bing Redirect on your Mac to prevent hackers from stealing your info.


More about Productivity ➜

Network Care

Smooth Surfing Ahead - Maintain a Healthy Online Network to Stay Connected and Informed

 
change router password icon

How to change router password

Change the router password to protect your network and devices from hackers.

change WiFi name icon

How to change WiFi name

Change your WiFi name to make it harder for hackers to target you.


spot unknown device icon

How to spot unfamiliar devices

Remove unfamiliar devices to keep your network safe from unauthorized access.


WiFi password icon

How to change WiFi password

Change your weak WiFi password to prevent cybercriminals from cracking it.


More about Network Care ➜

Cybersecurity FAQ

Find Answers to Your Cybersecurity Questions

Expand All
What is cybersecurity?
Why is cybersecurity important?
What are common cybersecurity threats?
How can I protect myself from cybersecurity threats?
Is cybersecurity difficult to learn?
How can I learn cybersecurity?

Search for more topics


 


Talk to a Digital Wellness Adviser

 

calls-avatar

Talk to a Trend Micro Support Representative

ADVISORY: Please be advised that our phone support is specifically dedicated to Trend Micro Renewals and Purchases.

Due to high demand, you may encounter a wait time before connecting with a Trend Micro Representative.

We appreciate your patience and encourage you to remain on the line. Your call will be addressed in the sequence it was received.

Select your country:

United States and Canada

United States and Canada
STANDARD SUPPORT
  • 1-800-864-6027
  • (MON-FRI) 5AM - 5PM PACIFIC TIME
PREMIUM SUPPORT
  • 1-877-275-8611
  • 24/7
HOME NETWORK SECURITY SUPPORT
  • 1-888-896-6923
  • 24/7

How helpful is our Help Center?

  • It was very unhelpful.
  • It was not helpful.
  • Just okay.
  • It was helpful.
  • It was very helpful.