{"id":37876,"date":"2020-10-27T12:36:56","date_gmt":"2020-10-27T12:36:56","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544561"},"modified":"2020-10-27T12:36:56","modified_gmt":"2020-10-27T12:36:56","slug":"trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/","title":{"rendered":"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security"},"content":{"rendered":"<p>Remember when only desktop computers in our homes had connections to the internet? Thanks to the latest developments in smart device technology, almost everything now can be connected\u2014 security cameras, smart TVs, gaming consoles, and network storage, to name just a few. While a home network provides lots of benefits, it can also expose us to safety and privacy risks.<\/p>\n<p>But checking for those risks need not be costly. How about a network security checker available <em>for<\/em> <em>free<\/em>? Yes, you read that right. Trend Micro\u2019s free <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-networks\">Housecall for Home Networks<\/a> (HCHN) scans the connected devices in your home network and detects those that pose security risks. And in doing so, it gives you a sense for what real network security entails. We have a solution for that also.<\/p>\n<p><strong>Want to know more? <\/strong><\/p>\n<p>Trend Micro HCHN uses intelligent network scanning technology to scan the devices connected to your home network for vulnerabilities. These can range from a low risk type\u2014such as an easily identifiable Wi-Fi Name that hackers can use to attack your router and home network\u2014to high risk types, such as SSL-Poodle (for man-in-the-middle attacks), Shellshock (for remote code execution attacks), Heartbleed (which puts website passwords at risk) and WannaCry (which is a Windows ransomware cryptoworm). These and other vulnerabilities can be detected through the help of this handy tool.<\/p>\n<p>In addition, HCHN checks devices for open ports that are usually targeted by hackers and malware and can be exploited for cybercriminal activities. Examples include ports 20 and 21, used via the File Transfer Protocol (FTP) to transfer files between an FTP client (20) and FTP server (21), which can deliver a multitude of vulnerabilities to the internet; as well as port 23, which sends data in Clear Text, which can be used by attackers to listen in, watch for credentials, or inject commands, enabling the hacker to perform Remote Code Executions.<\/p>\n<p>Moreover, HCHN gives you a report about the status of your home network and its connected devices and offers helpful advice for keeping your network and devices secure.<\/p>\n<p>Lastly, HCHN provides you a notification when:<\/p>\n<table>\n<tbody readability=\"1.5\">\n<tr readability=\"3\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>A new device joins the network<\/li>\n<li>Connecting to a new network<\/li>\n<li>A new vulnerability is found in the network.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Ready to install?<\/strong><\/p>\n<p>HCHN is easy to use and accessible from any device, be it Windows (7, 8 and 10), MacOS (10.12 or later), Android (5.0 or later) or iOS (8.0 or later). For your computer hardware, you just need to have Intel Pentium or compatible processor, a 256MB of RAM (512MB recommended) with at least 50MB available disk space and you\u2019re set.<\/p>\n<table>\n<tbody readability=\"3.743119266055\">\n<tr readability=\"7.4862385321101\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Download and install the application from the <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-networks\">Web<\/a>, <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.trendmicro.homenetworkscanner\">Google Play Store<\/a> or <a href=\"https:\/\/apps.apple.com\/us\/app\/trend-micro-home-network-scanner\/id1272476236\">Apple App Store<\/a>.<\/li>\n<li>During install, accept the <strong>Privacy and Personal Data Collection Disclosure Agreement<\/strong> which indicates the necessary information gathered in order to check for and identify vulnerabilities in devices connected to your home network and you\u2019re good to go.<\/li>\n<li>Once installed, inspect your home network\u2019s security risk exposure by clicking (applies to Windows and MacOS) or tapping (applies to Android and iOS) <strong>Scan Now<\/strong>. You\u2019re then presented with the result.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Are my home network and connected devices safe?<\/strong><\/p>\n<p>Here\u2019s a few scans we did\u2013from a Windows PC, then from and Android and iOS devices.<\/p>\n<p>When the scan is complete on a Windows computer it shows two tabs: Home Network and Devices.<\/p>\n<p>The first tab indicates a snapshot of your home network, identifying the devices at risk.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-544562 size-medium aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-300x186.png\" alt width=\"300\" height=\"186\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-300x186.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-768x477.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-640x397.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-900x559.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-440x273.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1-380x236.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-1.png 1002w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Figure 1. HouseCall for Home Networks \u2013 Home Network<\/p>\n<p>The second tab indicates a list of the devices scanned and the details of any device risks found.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-544563 size-medium aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-300x186.png\" alt width=\"300\" height=\"186\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-300x186.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-768x477.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-640x397.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-900x559.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-440x273.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2-380x236.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-2.png 1002w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Figure 2. HouseCall for Home Networks \u2013 Device List<\/p>\n<p>On the Android device, once the scan has finished, the screen will reveal any security risks detected. You can view the issue to see more details of the security risk in your home network. You can then slide to the next panel and check to verify all the connected devices on your network.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-544564 aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-300x157.png\" alt width=\"300\" height=\"157\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-300x157.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-1024x537.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-768x403.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-1536x806.png 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-2048x1074.png 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-640x336.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-900x472.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-440x231.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-3-380x199.png 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Figure 3. HCHN \u2013 At Risk Devices<\/p>\n<p>Similarly, upon completing the network scan from an iOS device, the app will display the risk that needs your attention. Just as with the Android device, you can move to the next panel to review the list of connected devices that were identified by Trend Micro HCHN.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-544565 aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-300x154.png\" alt width=\"300\" height=\"154\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-300x154.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-1024x526.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-768x394.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-1536x788.png 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-2048x1051.png 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-640x329.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-900x462.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-440x226.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-4-380x195.png 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Figure 4. HCHN \u2013 Needs Attention<\/p>\n<p><strong>A Few Reminders and Recommendations \u2026<\/strong><\/p>\n<table>\n<tbody readability=\"4.3558252427184\">\n<tr readability=\"8.7116504854369\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Use HCHN regularly to check the posture of your home network security, since new vulnerabilities and network risks may appear in the device after a time due to lack of firmware updates or a failure by the manufacturer to address a newfound risk.<\/li>\n<li>Ensure that the devices (including mobile devices such as phones or tablets) are on and connected to the network when a scan is performed.<\/li>\n<li>Some security products installed from the device initiating the network scan might detect the scan as suspicious and show a warning message or block user access. This doesn\u2019t mean that HCHN is a malicious application. Add HNCN to your security product\u2019s exception list, so it\u2019s allowed to examine your network and connected devices for security risks.<\/li>\n<li>The HNCN app does <em>not<\/em> automatically block dangerous network traffic or suspicious devices from connecting to your network. For that, and more home network security features, you should increase your home\u2019s network protection with <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/homenetworksecurity.html\">Trend Micro Home Network Security<\/a>. To that we now turn.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>What Home Network Security Provides<\/strong><\/p>\n<p>While a free network scan helps to determine the underlying dangers in your home network, to fully protect not only your home network but your family, you should consider Trend Micro Home Network Security (HNS) as a permanent enhancement to your network. It can shield your home against a wide variety of threats, including network intrusions, risky remote connections, phishing, ransomware, harmful websites and dangerous downloads. Additional features include the following:<\/p>\n<table>\n<tbody readability=\"7.5\">\n<tr readability=\"15\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>New Device Approval<\/strong> gives you control over the devices that are allowed access to your home network.<\/li>\n<li><strong>Remote Access Protection<\/strong> limits malicious individuals from using remote desktop programs to connect to your devices at home.<\/li>\n<li><strong>Voice Control<\/strong> lets you issue voice commands to Alexa or Google Home to perform specific functions on HNS such as conducting a scan, obtaining your home network\u2019s security status, pausing internet usage, disabling internet access for a user, and so on.<\/li>\n<li><strong>Parental Controls\u2019<\/strong> flexible and intuitive feature set, comprised of <strong>Filtering, Inappropriate App Used, Time Limits <\/strong>and<strong> Connection Alerts<\/strong>, can help any parent to provide a safe and secure internet experience for their kids. Combined with <strong>Trend Micro Guardian<\/strong>, parents can extend these protections to any network their children connect to, Wi-Fi or cellular.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Download the <strong>HNS App<\/strong> on your Android or iOS device to give it a spin. Note that the HNS App, <em>when used by itself,<\/em> performs the same functions as the HCHN app on those devices.<\/p>\n<p>If you like what you see, pair the <strong>HNS App<\/strong> to a <strong>Home Network Security Station<\/strong> to get the full range of protections. (Note too that once you do, the <strong>HCHN App<\/strong> will be disabled on all your devices and network and replaced by Home Network Security.)<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-544566 aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-300x145.png\" alt width=\"300\" height=\"145\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-300x145.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-1024x496.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-768x372.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-640x310.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-900x436.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-440x213.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5-380x184.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-5.png 1185w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Figure 5. Home Network Security (HNS) App<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-544567 aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-300x144.png\" alt width=\"300\" height=\"144\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-300x144.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-1024x492.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-768x369.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-640x308.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-900x433.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-440x212.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6-380x183.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/10\/housecall-6.png 1192w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Figure 6. HNS App Paired with the Home Network Security Station<\/p>\n<p><strong>Final Words<\/strong><\/p>\n<p>Home networks come with security risks. As the tech-savvy member of your household, you need to be aware of those risks. Using Trend Micro HouseCall for Home Networks (HCHN), you\u2019ll be able to know which devices are connected to your home Wi-Fi network and whether these devices bear security risks that can be exploited by hackers and malicious software. Moreover, you\u2019ll be provided with suggestions, in case your devices are found vulnerable.<\/p>\n<p>However, just <em>knowing<\/em> the security risks is only half the battle in protecting your home network. You\u2019ll need a more robust system that can automatically block suspicious and malicious traffic and do more\u2014 such as protecting your child\u2019s online safety. Trend Micro Home Network Security (HNS) can address your home network\u2019s security, even as it monitors your home network, prevents intrusions, blocks hacking attempts and web threats, and protects your family\u2019s privacy, while keeping the internet safe for your kids.<\/p>\n<p>Download Trend Micro Housecall for Home Networks from the <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/housecall\/home-networks.html\">Web<\/a>, <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.trendmicro.homenetworkscanner\">Google Play Store<\/a> or <a href=\"https:\/\/apps.apple.com\/us\/app\/trend-micro-home-network-scanner\/id1272476236\">Apple App Store<\/a> to give it a try.<\/p>\n<p>Go to <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-network-security\">Trend Micro Home Network Security<\/a> to get more details on the solution, or to buy.<!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Button BEGIN --><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remember when only desktop computers in our homes had connections to the internet? Thanks to the latest developments in smart device technology, almost everything now can be connected\u2014 security cameras, smart TVs, gaming consoles, and network storage, to name just a few. While a home network provides lots of benefits, it can also expose us&#8230;<br \/>\nThe post Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37877,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[390,307],"class_list":["post-37876","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-consumer","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-27T12:36:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security\",\"datePublished\":\"2020-10-27T12:36:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/\"},\"wordCount\":1404,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png\",\"keywords\":[\"Consumer\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/\",\"name\":\"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png\",\"datePublished\":\"2020-10-27T12:36:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png\",\"width\":300,\"height\":186},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consumer\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/consumer\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-27T12:36:56+00:00","og_image":[{"width":300,"height":186,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security","datePublished":"2020-10-27T12:36:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/"},"wordCount":1404,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png","keywords":["Consumer","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/","url":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/","name":"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png","datePublished":"2020-10-27T12:36:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security.png","width":300,"height":186},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Consumer","item":"https:\/\/www.threatshub.org\/blog\/tag\/consumer\/"},{"@type":"ListItem","position":3,"name":"Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37876"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37876\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37877"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}