HouseCall for Home Networks
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
This blog tackles the recently ill-famed VPNFilter malware and if deployed devices are vulnerable to it. VPNFilter is a newly discovered, multi-stage malware (detected by Trend Micro as ELF_VPNFILT.A, ELF_VPNFILT.B, ELF_VPNFILT.C, and ELF_VPNFILT.D) that affects many models of connected devices.
Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC).
At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora.
Google’s Home smart gadget infrastructure stopped working worldwide. Google released a fix that can be automatically installed after a reboot.
Our honeypot sensors, which are designed to emulate Secure Shell (SSH), Telnet, and File Transfer Protocol (FTP) services, recently detected a mining bot related to the IP address 184.108.40.206. The address has been seen to search for both SSH- and IoT-related ports, including 22, 2222, and 502.
Researchers found seven vulnerabilities in Axis cameras can be used for cyberattacks if exploited. While only POCs have been shown, customers are strongly advised to patch their firmware immediately.
Learn how the Trend Micro Virtual Network Function Suite (VNFS) deals with IoT security concerns, especially with carrier NFV environments.
PyRoMineIoT malware infects systems with a Monero miner, spreads using RCE EternalRomance by removing or modifying accounts and passwords with privileged access, and scans for vulnerable Internet of Things devices for possible future attacks.
The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?
Already a vital part of the critical infrastructure of the internet, satellites are set to take on a more significant role with the emergence of 5G cellular network technology and the continuing expansion of the internet of things (IoT).
Already, current cellular network technologies such as 3G and 4G allow fast wireless communication. But the next evolution, 5G, is set to afford even faster connections along with greater reliability. Touted as the next generation of mobile internet connectivity, 5G will offer speeds of the order of several gigabits per second (Gbps), with average download rates expected to be about 1 Gbps.
Malware that impacts IoT systems, however, operates a bit differently than traditional malware.
Using our IoT Smart Checker, a tool that scans networks for potential security risks, we looked into home and other small network environments and the vulnerabilities that connected devices usually encounter. Our findings homed in on known vulnerabilities, IoT botnets with top vulnerability detections, and devices that are affected.
VPNFilter malware has infected routers in more than 54 countries and can be used for attacks, intelligence collection, and destroying devices in a single command worldwide, affecting both enterprise and home networks.
When crucial health care systems and devices are exposed and accessible through the internet, it puts daily operations and patient care at risk.