• TOP
  • Top Rankings

Top Rankings

1 CEO Interview: Eva Chen Meets with ‘IIoT World’
2018/05/07

CEO Interview: Eva Chen Meets with ‘IIoT World’

Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).

2 Trend Micro will start providing the “Trend Micro Virtual Network Function Suite” to deliver comprehensive security for NFV environments
2018/06/20

Trend Micro will start providing the “Trend Micro Virtual Network Function Suite” to deliver comprehensive security for NFV environments

Trend Micro forecasts a big change coming in how telecoms work with IoT devices like smart speakers and smart TVs. The launch of 5th generation mobile technology (5G) will lead to a wide range of flexible services for different customers. However, the range of security threats has also increased and diversified, so security measures absolutely must change in this even more interconnected world.

3 Trend Micro Virtual Network Function Suite
2018/06/20

Trend Micro Virtual Network Function Suite

Learn how the Trend Micro Virtual Network Function Suite (VNFS) deals with IoT security concerns, especially with carrier NFV environments.

4 Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras
2018/04/24

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.

5 Stopping Attacks on Connected Cars - Trend Micro at Hannover Messe
2018/04/23

Stopping Attacks on Connected Cars - Trend Micro at Hannover Messe

At this year’s Hannover Messe, one of the world’s largest industrial technology trade fairs, Trend Micro showcased cybersecurity solutions for cloud applications, smart factories, and the Industrial Internet of Things (IIoT).

6 Threats to Voice-Based IoT and IIoT Devices
2018/04/20

Threats to Voice-Based IoT and IIoT Devices

According to one estimate, 33 million "voice-first" devices would have already been shipped by the end of last year. Given the staggering number of voice-based internet-of-things (IoT) devices that are apparently in use around the world, it’s worth noting that security for these devices should become a top priority.

7 Trend Micro Debunks Common Home Network Security Myths
2018/03/27

Trend Micro Debunks Common Home Network Security Myths

For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.

8 Connected Vehicle Security Vulnerabilities
2018/03/21

Connected Vehicle Security Vulnerabilities

In the history of mandatory regulation of computerized vehicles, an E-Letter entitled, “Black box is not safe at all,” was published. It mentioned that on-board diagnostics (OBD-II) specifications were made mandatory for all cars sold in the United States in 1996. The European Union made European OBD (EOBD) mandatory for all gasoline (petrol) vehicles sold in the European Union starting in 2001.

9 The Risks of Bio-IoT
2018/05/02

The Risks of Bio-IoT

Bio-IoT: Internet of Things applied to biological systems, such as pharmaceutical delivery systems, implanted medical devices, intelligent prosthetics, surgical assistants, and remote patient monitoring.

10 Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces
2018/04/09

Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces

Every year, Black Hat Asia gathers security researchers and enthusiasts alike to demonstrate how technologies and applications can be improved. Last year, researchers delved into vulnerabilities and exploits that affected devices on the internet of things (IoT). This year is no different, as the conference has brought forth more hacks and concerns around the IoT. And one affected field in particular may be a little too close for comfort: wearables.

PageTop