• TOP
  • IoT Threats And Solutions

IoT Threats And Solutions

2018/07/19

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

This blog tackles the recently ill-famed VPNFilter malware and if deployed devices are vulnerable to it. VPNFilter is a newly discovered, multi-stage malware (detected by Trend Micro as ELF_VPNFILT.A, ELF_VPNFILT.B, ELF_VPNFILT.C, and ELF_VPNFILT.D) that affects many models of connected devices.

2018/07/17

How the Industry 4.0 Era Will Change the Cybersecurity Landscape

How the Industry 4.0 Era Will Change the Cybersecurity Landscape

Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC).

2018/07/16

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora.

2018/06/28

Reboot Your Smart Devices: Google Home Infrastructure Down For Hours

Reboot Your Smart Devices: Google Home Infrastructure Down For Hours

Google’s Home smart gadget infrastructure stopped working worldwide. Google released a fix that can be automatically installed after a reboot.

2018/06/26

Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site

Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site

Our honeypot sensors, which are designed to emulate Secure Shell (SSH), Telnet, and File Transfer Protocol (FTP) services, recently detected a mining bot related to the IP address 192.158.228.46. The address has been seen to search for both SSH- and IoT-related ports, including 22, 2222, and 502.

2018/06/21

Patch Now: Axis Cameras’ Flaws Could Give Attackers Control

Patch Now: Axis Cameras’ Flaws Could Give Attackers Control

Researchers found seven vulnerabilities in Axis cameras can be used for cyberattacks if exploited. While only POCs have been shown, customers are strongly advised to patch their firmware immediately.

2018/06/20

Trend Micro Virtual Network Function Suite

Trend Micro Virtual Network Function Suite

Learn how the Trend Micro Virtual Network Function Suite (VNFS) deals with IoT security concerns, especially with carrier NFV environments.

2018/06/19

PyRoMineIoT Targets, Infects, and Spreads to Vulnerable IoT Devices

PyRoMineIoT Targets, Infects, and Spreads to Vulnerable IoT Devices

PyRoMineIoT malware infects systems with a Monero miner, spreads using RCE EternalRomance by removing or modifying accounts and passwords with privileged access, and scans for vulnerable Internet of Things devices for possible future attacks.

2018/06/14

Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping

Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping

The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?

2018/06/13

Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G

Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G

Already a vital part of the critical infrastructure of the internet, satellites are set to take on a more significant role with the emergence of 5G cellular network technology and the continuing expansion of the internet of things (IoT).

2018/06/07

Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale

Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale

Already, current cellular network technologies such as 3G and 4G allow fast wireless communication. But the next evolution, 5G, is set to afford even faster connections along with greater reliability. Touted as the next generation of mobile internet connectivity, 5G will offer speeds of the order of several gigabits per second (Gbps), with average download rates expected to be about 1 Gbps.

2018/06/05

Malware in the age of IoT

Malware in the age of IoT

Malware that impacts IoT systems, however, operates a bit differently than traditional malware.

2018/06/04

Identifying Top Vulnerabilities in Networks: Old Vulnerabilities, IoT Botnets, Wireless Connection Exploits

Identifying Top Vulnerabilities in Networks: Old Vulnerabilities, IoT Botnets, Wireless Connection Exploits

Using our IoT Smart Checker, a tool that scans networks for potential security risks, we looked into home and other small network environments and the vulnerabilities that connected devices usually encounter. Our findings homed in on known vulnerabilities, IoT botnets with top vulnerability detections, and devices that are affected.

2018/05/30

Reboot Your Routers: VPNFilter Infected Over 500,000 Routers Worldwide

Reboot Your Routers: VPNFilter Infected Over 500,000 Routers Worldwide

VPNFilter malware has infected routers in more than 54 countries and can be used for attacks, intelligence collection, and destroying devices in a single command worldwide, affecting both enterprise and home networks.

2018/05/28

How connected devices put health care at risk

How connected devices put health care at risk

When crucial health care systems and devices are exposed and accessible through the internet, it puts daily operations and patient care at risk.

PageTop