HouseCall for Home Networks
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).
Trend Micro forecasts a big change coming in how telecoms work with IoT devices like smart speakers and smart TVs. The launch of 5th generation mobile technology (5G) will lead to a wide range of flexible services for different customers. However, the range of security threats has also increased and diversified, so security measures absolutely must change in this even more interconnected world.
Learn how the Trend Micro Virtual Network Function Suite (VNFS) deals with IoT security concerns, especially with carrier NFV environments.
IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.
At this year’s Hannover Messe, one of the world’s largest industrial technology trade fairs, Trend Micro showcased cybersecurity solutions for cloud applications, smart factories, and the Industrial Internet of Things (IIoT).
According to one estimate, 33 million "voice-first" devices would have already been shipped by the end of last year. Given the staggering number of voice-based internet-of-things (IoT) devices that are apparently in use around the world, it’s worth noting that security for these devices should become a top priority.
For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.
In the history of mandatory regulation of computerized vehicles, an E-Letter entitled, “Black box is not safe at all,” was published. It mentioned that on-board diagnostics (OBD-II) specifications were made mandatory for all cars sold in the United States in 1996. The European Union made European OBD (EOBD) mandatory for all gasoline (petrol) vehicles sold in the European Union starting in 2001.
Bio-IoT: Internet of Things applied to biological systems, such as pharmaceutical delivery systems, implanted medical devices, intelligent prosthetics, surgical assistants, and remote patient monitoring.
Every year, Black Hat Asia gathers security researchers and enthusiasts alike to demonstrate how technologies and applications can be improved. Last year, researchers delved into vulnerabilities and exploits that affected devices on the internet of things (IoT). This year is no different, as the conference has brought forth more hacks and concerns around the IoT. And one affected field in particular may be a little too close for comfort: wearables.