HouseCall for Home Networks
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).
Today’s homes are filled with connected devices that usually lack the protection more often found on PCs and smartphones. To counter this, NTT DOCOMO set out to create a router that could minimize the security risks of those devices. They chose Trend Micro Smart Home Network™ for their embedded network security solution.
The harnessing of energy and water and their distribution to households, facilities, and entire cities is the incredible responsibility of critical sectors. Nowadays, infrastructures built to handle these processes operate with such efficiency that energy and water can run in the background of the daily bustle of human activity.This feat is achieved through the continuing development of technology surrounding such resources — development that now involves being “smart.”
DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced a partnership with NTT DOCOMO to develop a new solution for the demands of the 5G era.
According to Ku, “Thirty years ago people looked at security on the IT side as an afterthought and this is what’s happening on the OT side today”
Learn how the Trend Micro Virtual Network Function Suite (VNFS) deals with IoT security concerns, especially with carrier NFV environments.
IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.
For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.
In the history of mandatory regulation of computerized vehicles, an E-Letter entitled, “Black box is not safe at all,” was published. It mentioned that on-board diagnostics (OBD-II) specifications were made mandatory for all cars sold in the United States in 1996. The European Union made European OBD (EOBD) mandatory for all gasoline (petrol) vehicles sold in the European Union starting in 2001.
Every year, Black Hat Asia gathers security researchers and enthusiasts alike to demonstrate how technologies and applications can be improved. Last year, researchers delved into vulnerabilities and exploits that affected devices on the internet of things (IoT). This year is no different, as the conference has brought forth more hacks and concerns around the IoT. And one affected field in particular may be a little too close for comfort: wearables.