• TOP
  • IoT Threats And Solutions

IoT Threats And Solutions

2018/09/17

Patch Now: New Mirai, Gafgyt Variants Target 16 Flaws Via Multi-Exploits

Patch Now: New Mirai, Gafgyt Variants Target 16 Flaws Via Multi-Exploits

Researchers reported that new variations of Internet of Things (IoT) botnets Mirai (Detection: Backdoor.Linux.MIRAI.AB and Gafgyt (Detection: Backdoor.Linux.GAFGYT.AA) are targeting known vulnerabilities in Apache Struts and SonicWall. Samples of the new Mirai variant target 15 vulnerabilities in Apache Struts with multiple exploits, including the flaw that caused the 2017 Equifax data breach.

2018/09/10

The Risk of IoT Security Complacency

The Risk of IoT Security Complacency

Trend Micro recently surveyed 1,150 IT executives globally. We found a gap between the perceived risk from IoT and the planned mitigation for that risk. Most senior executives recognize that IoT can introduce security risk to the organization, but few will invest resources to remediate that risk.

2018/09/06

Trend Micro Emphasizes Importance of IoT Security at Pwn2Own Tokyo 2018

Trend Micro Emphasizes Importance of IoT Security at Pwn2Own Tokyo 2018

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced details of its fall security research competition, Pwn2Own Tokyo, run by the Zero Day Initiative (ZDI). This year’s contest is expanding to include IoT devices in a reflection of the growing ‘Internet of Threats’ facing businesses and consumers.

2018/09/05

Securing the Convergence of IT with OT

Securing the Convergence of IT with OT

The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well.

2018/09/05

Trend Micro Teams Up with Moxa to Secure and Accelerate Industrial Internet of Things Applications

Trend Micro Teams Up with Moxa to Secure and Accelerate Industrial Internet of Things Applications

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, has announced a new partnership with Moxa Inc., a leader in industrial communication and networking, as part of its Technology Alliance Partner Program to jointly develop state-of-the-art solutions to protect Industrial Internet of Things (IIoT) environments like smart manufacturing and smart energy.

2018/08/28

Trend Micro Research Launches New Program to Help IoT Device Makers Tackle Risk at Source

Trend Micro Research Launches New Program to Help IoT Device Makers Tackle Risk at Source

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, has reconfirmed its commitment to Internet of Things (IoT) security by leading the industry with a new program designed to leverage the global leadership of its Zero Day Initiative (ZDI) to minimize vulnerabilities as smart products are developed.

2018/08/23

Back to Basics: Why We Need to Encourage More Secure IoT Development

Back to Basics: Why We Need to Encourage More Secure IoT Development

The Internet of Things (IoT) is radically reshaping the way we live and work. Before our very eyes, organizations are becoming more agile, efficient and cost effective to run, all while consumers marvel at the wonders of the smart home, fitness trackers and connected cars.

2018/08/22

Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks

Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks

At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in printers. Here's how managed detection and response can help address similar threats.

2018/08/20

Carrier Grade Security Means … Using Carrier Grade Security

Carrier Grade Security Means … Using Carrier Grade Security

It’s a common mistake in enterprises to copy-paste security solutions from a peer. Strategies can be recycled, but sadly with even very similar businesses almost always have radically different IT and security requirements.

2018/08/16

Trend Micro Launches Product to Protect Telecom Networks Serving Business and Home Users

Trend Micro Launches Product to Protect Telecom Networks Serving Business and Home Users

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced the launch of a product that enables telecom carriers as well as service and cloud providers to protect telecom networks.

2018/08/09

A Look Into Smart Factories: A Model of IIoT Innovation

A Look Into Smart Factories: A Model of IIoT Innovation

The IIoT is a catalyst for development in many industries. For manufacturing, IIoT innovation is best demonstrated by one of its prominent models, the smart factory.

2018/08/06

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign

Security researchers uncovered a cryptojacking campaign that exploits a vulnerability in MikroTik routers to inject a malicious version of Coinhive. Here’s what you need to know.

2018/07/31

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.”

2018/07/30

Trend Micro Survey Confirms A Disregard for the Risk of an IoT Breach and Finds Loss of Trust As Biggest Potential Consequence

Trend Micro Survey Confirms A Disregard for the Risk of an IoT Breach and Finds Loss of Trust As Biggest Potential Consequence

LONDON--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today released survey findings that show businesses are most concerned about losing customer trust in the event of an Internet of Things (IoT) related cyber attack, however they remain unprepared.

2018/07/26

Preparing for Shadow OT: A Hospital Case Study

Preparing for Shadow OT: A Hospital Case Study

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments.

PageTop