• TOP
  • IoT Threats And Solutions

IoT Threats And Solutions

2018/02/20

Panasonic and Trend Micro Agree to Develop Cyber-Security Solution for Connected Cars

Panasonic and Trend Micro Agree to Develop Cyber-Security Solution for Connected Cars

Panasonic Corporation and Trend Micro Incorporated today announced a partnership to jointly develop a cyber-security solution to detect and prevent cyber-attacks against autonomous and connected cars.

2018/02/20

Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test

Trend Micro Achieves “Recommended” Rating from NSS Labs in Data Center IPS Group Test

Research from NSS Labs indicates that DCIPS devices are typically deployed to protect data center assets, and most enterprises will tune intrusion prevention system (IPS) modules within their DCIPS. Therefore, during NSS testing, DCIPS products are configured with a tuned policy setting in order to provide readers with relevant security effectiveness and performance dimensions based on their expected usage.

2018/02/09

Strava Publishes Heatmap, Inadvertently Exposes Military Sites

Strava Publishes Heatmap, Inadvertently Exposes Military Sites

A report revealed that In November 2017, fitness tracking app Strava published a heatmap of its user activity that was composed of a billion activities, three trillion latitude/longitude points, 13 trillion rasterized pixels and 10 TB worth of input data. However, the fitness app could have also accidentally revealed the hidden locations of secret U.S. military bases, patrols, and forward operating bases (FOBs).

2018/02/04

Data Privacy in the Age of IoT

Data Privacy in the Age of IoT

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT — the Internet of Things?

2018/01/30

Diebold Nixdorf, NCR Corp. Send Out Warnings of ATM Jackpotting Attacks to US Banks

Diebold Nixdorf, NCR Corp. Send Out Warnings of ATM Jackpotting Attacks to US Banks

ATM manufacturers Diebold Nixdorf and NCR Corp. issued security alerts to banks on ATM jackpotting attacks, which are being detected for the first time in the United States. The warning follows a U.S. Secret Service alert that cybercriminals are using various techniques that force ATMs to “spit out” cash. In the criminal underground, this term is also known as ATM jackpotting.

2018/01/29

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

Botnets that target Internet of Things (IoT) devices are neither new nor rare, with the infamous Mirai perhaps being the most popular example. However, a new botnet dubbed “Hide ‘N Seek”, or HNS, is seemingly one of the first—along with the Hajime botnet—to use custom built peer-to-peer (P2P) communication for its infrastructure. The botnet has affected over 24,000 devices, including devices in the U.S. and Asia, as of the time of publication.

2018/01/18

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

The continuous development of Internet of Things (IoT) devices will reportedly push the global IoT market to grow from US$157 billion in 2016 to $457 billion by 2020. CES (Consumer Electronics Show), the gathering place for all those who thrive on the business of consumer technologies, hosted its annual event at the Las Vegas Convention Center to showcase what’s in store for the market this year.

2018/01/11

Securing the Three Families of IoT

Securing the Three Families of IoT

Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach.

2018/01/04

Source Code of IoT Botnet Satori Publicly Released on Pastebin

Source Code of IoT Botnet Satori Publicly Released on Pastebin

In early December last year, Satori affected 280,000 IP addresses in just 12 hours, ensnaring numerous home routers to become part of its botnet.

2017/12/27

The Need for Better Built-in Security in IoT Devices

The Need for Better Built-in Security in IoT Devices

To see just how safe and secure IoT devices are and to what extent an attacker can manipulate an IoT device, we tested the built-in security of a particular IoT device type — internet-connected speakers.

2017/12/24

Trend Micro Cybersecurity Reference Architecture for Operational Technology

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks are now a reality that they have to grapple with.

2017/12/21

5 Smart Ways to Enjoy a Hack-Free Holiday

 5 Smart Ways to Enjoy a Hack-Free Holiday

'Tis the season to be jolly ... and enjoy your holiday haul! New gear normally arrives at this time of year (maybe an iPhone X?), but new devices come with new risks. Even if you have smart online shopping habits, your new tech can put your privacy in jeopardy, or worse.

2017/12/19

Dissecting PRILEX and CUTLET MAKER ATM Malware Families

Dissecting PRILEX and CUTLET MAKER ATM Malware Families

The malware family called Prilex was first reported by Kaspersky in October 2017. We dissected this malware and found something very atypical: It works by hooking certain dynamic-link libraries (DLLs), replacing it with its own application screens on top of others.

2017/12/13

Telco Systems Expands Arm Ecosystem with Joint Security Offering with Trend Micro

Telco Systems Expands Arm Ecosystem with Joint Security Offering with Trend Micro

The new joint offering combines rich industry experiences and enables telcos and managed service providers to deliver best-of-breed network security services, including intrusion prevention and web security, with Arm-based uCPE white box solutions.

2017/12/05

Trend Micro Security Predictions for 2018: Paradigm Shifts

Trend Micro Security Predictions for 2018: Paradigm Shifts

As information technology and operational technology (IT/OT) continue to converge, enterprise applications and platforms will be at risk of manipulation and vulnerabilities, as stated in Trend Micro’s 2018 predictions report. Additionally, Trend Micro predicts an increase in Internet of Things vulnerabilities as more devices are manufactured without security regulations or industry standards.

PageTop