• TOP

  • IoT Threats And Solutions

IoT Threats And Solutions

2019/06/17

Xenotime, Hacking Group Behind Triton, Found Probing Industrial Control Systems of Power Grids in the US

Xenotime, Hacking Group Behind Triton, Found Probing Industrial Control Systems of Power Grids in the US

The hacking group behind intrusions targeting facilities in oil and gas industries has started probing industrial control systems (ICSs) of power grids in the U.S. and the Asia-Pacific region ...

2019/06/13

Trend Micro Collaborates with DOCOMO to Launch Security for IoT Devices, Fully Protecting Business Users’ Connected Experience

Trend Micro Collaborates with DOCOMO to Launch Security for IoT Devices, Fully Protecting Business Users’ Connected Experience

Trend Micro Incorporated, a global leader in cybersecurity solutions, today announced NTT DOCOMO, INC., Japan's leading mobile operator and one of the world's foremost contributors to 3G, 4G and 5G mobile network technologies, will launch a solution to protect IoT devices running on DOCOMO’s mobile network utilizing Trend Micro’s security solution.

2019/06/04

Trend Micro Highlights Security Risks of Connected Cars at Connected & Autonomous Vehicles 2019

Trend Micro Highlights Security Risks of Connected Cars at Connected & Autonomous Vehicles 2019

Trend Micro participated in the 2019 edition of Connected & Autonomous Vehicles, which was co-located with Internet of Things World. At the event — held from May 14 to 16 in Santa Clara, California, with more than 300 exhibiting companies and over 12,500 visitors — Trend Micro highlighted the security risks of connected cars.

2019/05/30

The IoT Attack Surface: Threats and Security Solutions

The IoT Attack Surface: Threats and Security Solutions

The internet of things (IoT) is easily one of the most versatile technologies in existence today. The ubiquity of the internet, the growing capacity of network connection, and the diversity of connected devices make the IoT scalable and adaptable.

2019/05/23

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

We discovered a new variant of Mirai (detected as Backdoor.Linux.MIRAI.VWIPT) that uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks.

2019/05/22

Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate.

2019/05/09

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software.

2019/05/08

Are Your Devices at Risk? Find out with HouseCall for Home Networks

Are Your Devices at Risk? Find out with HouseCall for Home Networks

HouseCall for Home Networks is a free and easy-to-use Trend Micro solution that scans your Wi-Fi connected devices and checks them for security risks to protect you from hackers, privacy leaks, and other threats.

2019/05/07

MegaCortex Ransomware Spotted Attacking Enterprise Networks

MegaCortex Ransomware Spotted Attacking Enterprise Networks

A new ransomware called MegaCortex (Trend Micro detects this as RANSOM.WIN32.CORTEX.SM) has been reportedly deployed against large corporate networks and workstations in the United States, Canada and parts of Europe.

2019/05/03

IoT Devices in the Workplace: Security Risks and Threats to BYOD Environments

IoT Devices in the Workplace: Security Risks and Threats to BYOD Environments

One of the most apparent manifestations of how the IoT has prompted changes in businesses and organizations is the presence and use of employee-owned IoT devices in the workplace.

2019/04/30

Security for the Internet of Things

Security for the Internet of Things

Internet of Things World, the largest conference of this type in North America, runs from May 13th to May 16th in Santa Clara, California.

2019/04/29

iLnkP2P Flaws Expose Over 2 Million IoT Devices to Remote Attacks

iLnkP2P Flaws Expose Over 2 Million IoT Devices to Remote Attacks

Millions of security cameras and other internet of things (IoT) devices were found with critical security flaws involving peer-to-peer (P2P) communications technology.

2019/04/22

What Did We Learn from the Global GPS Collapse?

What Did We Learn from the Global GPS Collapse?

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS.

2019/04/18

Is Your Baby Monitor Susceptible to Hacking?

Is Your Baby Monitor Susceptible to Hacking?

In a number of high-profile cases, home surveillance cameras have been easily compromised and disturbing reports of hacked baby monitors are in the news.

2019/04/16

IP Camera Cyberthreats in the Real World

IP Camera Cyberthreats in the Real World

IP cameras make for a good target for hackers. Even novice hackers are said to be taking advantage of the readily available tools in open-source communities to hack into these internet-of-things (IoT) devices.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop