The failure of a Trend Micro employee to install his company’s own antivirus software led to the uploading of some company reports to a popular Japanese peer-to-peer file-sharing network, the company said Monday.About a year ago an employee, who is no longer with Trend Micro, copied data including reports to his boss and proposals regarding the company’s products to his home computer, said Kazuhisa Tagaya, a spokesman for the Tokyo company. However, the computer was infected through the Winny file-sharing application with a virus that caused the files to be released over the file-sharing network.“We didn’t say anything at the time because one file has a customer’s company name,” said Tagaya. “If we did say this then, people would have searched for the file and it would have caused trouble for the customer. Now, such accidents happen every day, and the version of the file being distributed on Winny has been rewritten incorrectly by someone so is wrong.”He said the file wasn’t altered by Trend Micro or its employees. In disclosing the data leak, Trend Micro becomes the latest of a number of corporations or government agencies to report data losses as a result of viruses on the Winny network. Winny can be downloaded at no charge and is a popular way for Japanese Internet users to exchange music and video files.Documents including police investigation materials, training manuals for Japan’s Self Defense Forces, data related to nuclear power plants and information including the names of sex crime victims have all found their way into the public domain via Winny, according to local news reports. The string of leaks led a senior Japanese government official, Chief Cabinet Secretary Shinzo Abe, to call on people not to use Winny.“We cannot prevent information leaks unless everyone takes anti-virus measures,” Abe said at a news conference on March 15. “The surest way is not to use Winny.”For Trend Micro, the loss of data due to a virus is likely an embarrassment for the company.“Trend Micro gives its anti-virus software to all employees for installation on their home computers,” said Tagaya. In this case, it appears the employee did not bother to install the software on his home computer.-Martyn Williams, IDG News ServiceFor related news coverage, read Study: Online Abuse By U.K. Workers Rampant. Keep checking in at our CSO Security Feed page for updated news coverage. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe