• TOP
  • IoT Threats And Solutions

IoT Threats And Solutions

2017/12/05

Trend Micro Security Predictions for 2018: Paradigm Shifts

Trend Micro Security Predictions for 2018: Paradigm Shifts

As information technology and operational technology (IT/OT) continue to converge, enterprise applications and platforms will be at risk of manipulation and vulnerabilities, as stated in Trend Micro’s 2018 predictions report. Additionally, Trend Micro predicts an increase in Internet of Things vulnerabilities as more devices are manufactured without security regulations or industry standards.

2017/12/04

New Mirai Attack Attempts Detected in South America and North African Countries

New Mirai Attack Attempts Detected in South America and North African Countries

Just a few days ago, the notorious Internet of Things (IoT) botnet known as Mirai (detected by Trend Micro as ELF_MIRAI family) was detected as being active in a new campaign targeting Argentina, when red flags were raised after an increase in traffic on ports 2323 and 23.

2017/11/30

Trend Micro IoT Security Support for Mentor Automotive ConnectedOS™

Trend Micro IoT Security Support for Mentor Automotive ConnectedOS™

As cars become more connected and smarter, security requirements for automotive systems are constantly growing. Trend Micro today announced that Trend Micro IoT Security supports Mentor Automotive ConnectedOS™ from Mentor, a Siemens business.

2017/11/30

Our Exposed World – Exposed Cities in Europe

Our Exposed World – Exposed Cities in Europe

Trend Micro’s FTR team released more papers on our continued investigation into our exposed world. Already having looked at the Exposed US, we now turn our attention to Europe, looking not only at Western European capitals, but deeper into three of its largest countries – Germany, France, and the United Kingdom.

2017/11/28

Securing the Transportation Network of Tomorrow

Securing the Transportation Network of Tomorrow

Securing the physical and cyber infrastructure of an ITS is a huge undertaking for all stakeholders. What would it take to secure and protect such a massive system against cyber threats, especially for those who are or will be responsible for one (i.e., a Chief Information Security Officer [CISO])? The first step is to know what the threats are and which ITS components are high risk.

2017/11/27

New Mirai Variant Found Spreading like Wildfire

New Mirai Variant Found Spreading like Wildfire

A security researcher reportedly discovered a new variant of Mirai (identified by Trend Micro as ELF_MIRAI family) that is quickly spreading. A notable increase in traffic on port 2323 and 23 was observed over the weekend, with around 100 thousand unique scanner IPs coming from Argentina.

2017/11/15

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Wearable internet-of-things (IoT) devices like smartwatches can help parents keep an eye on their children while also providing them the independence and connectivity they need for their lifestyle and activities.

2017/11/07

Trend Micro Delivers Appliance with Industry’s Fastest Network Inspection in the Smallest Form Factor

Trend Micro Delivers Appliance with Industry’s Fastest Network Inspection in the Smallest Form Factor

In our 2017 NGIPS Group Test, Trend Micro made an impressive demonstration of performance and security,” said Vikram Phatak, CEO of NSS Labs. “Overall, no tradeoffs seem to have been made when achieving the compact 1U form factor of the new TX series.

2017/11/06

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

The ‘WannaCry” and “Petya” (also known as NotPetya or GoldenEye) outbreaks rank as the most damaging global cyber security incidents during the first half of 2017. These massive ransomware attacks impacted the networks of hospitals, factories, and railroads in many different countries with serious consequences.

2017/11/02

Taking Steps towards Secure Manufacturing

Taking Steps towards Secure Manufacturing

In 2016, an independent study recognized the manufacturing industry as the second most attacked industry. While the healthcare sector is still the most frequently attacked, attacks on manufacturing come as no surprise since it's an expansive industry that includes the automotive, textile, electronic and other subgroups that manufacture a multitude of different products.

2017/10/25

Accelerating Security for Intelligent Transportation Systems: A New Trend Micro Report

Accelerating Security for Intelligent Transportation Systems: A New Trend Micro Report

Connected cars and autonomous vehicles are getting all the headlines these days, especially when it comes to cybersecurity concerns. But that’s only half of the story. An under-reported but hugely important piece of the puzzle relates to the Intelligent Transportation Systems (ITS) needed to create truly smart cities. Governments around the world, including the US, are already investing in these systems – and cyber attacks on them are already beginning to make the news.

2017/10/23

Security Risks in a Technology-Driven World

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

2017/10/19

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

“Trend Micro’s Deep Discovery achieved a 100% security effectiveness rating with the fastest time to detect attacks amongst all tested products,” said Vikram Phatak, CEO of NSS Labs. “There is no question that Deep Discovery should be on the short list for everyone considering a Breach Detection solution.”

2017/10/19

Google Home Mini Speaker Discovered Eavesdropping on Home User

Google Home Mini Speaker Discovered Eavesdropping on Home User

Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One similar incident involving Google’s Home Mini speaker was discovered by Artem Russakovskii of Android Police, who reported that the device was listening and recording all the sounds it picks up in its vicinity.

2017/10/18

Dnsmasq: A Reality Check and Remediation Practices

Dnsmasq: A Reality Check and Remediation Practices

Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options.

PageTop