Internet of Things

The inevitable rise of IoT homes is driving a market hungry for convenience and efficiency, but this trend is also bringing up serious concerns. Who is ultimately responsible for securing IoT homes: buyers or manufacturers?
The reality for home users is that not all smart devices have basic built-in security measures. This gives you, as a user, the de facto responsibility to secure the way you set up and use the devices.
Over the last few years, there have been reports published by security researchers that have proven that smart devices can indeed be abused.
People should be able to use smart devices without worry, but the current reality makes this a challenge. The way today's home IoT devices are designed and built puts functionality to the fore and often relegates security as an afterthought.
One day, everything will be buttonless. Nobody will ever need to grab the remote to turn on the television or hit a switch to kill the lights. These devices will just do what they’re supposed to, all by themselves, without any physical prompts from the user.
View more
The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.
Senior threat researcher Rainier Link talks about smart car security, the role of car manufacturers in securing vehicle systems, and security as a top consideration when creating new tech.
Part 3 of the FuTuRology project speculates on future healthcare tech that could provide opportunities for attackers and threats to healthcare users.
In this second post in the “FuTuRology” project, the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of wearables and the healthcare industry.
In this time of rampant data breaches and information theft, Trend Micro CTO Raimund Genes shares his ideas on how companies can better and more responsibly treat their users’ data.
It wouldn’t be Black Hat if the conference didn’t have demonstrations that show how some technologies can be improved. This year, a lot of topics covered the IoT, as well as drones, drones, and more drones.
A security informatics team in John Hopkins University has raised concerns over the security of drones (unmanned aerial vehicles or UAVs) after it hijacked one and sent it crashing.

Connect with us on