• TOP
  • IoT Threats And Solutions

IoT Threats And Solutions

2018/05/21

Blockchain: The Missing Link Between Security and the IoT?

Blockchain: The Missing Link Between Security and the IoT?

Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?

2018/05/17

Exposed Video Streams: How Hackers Abuse Surveillance Cameras

Exposed Video Streams: How Hackers Abuse Surveillance Cameras

IP surveillance cameras provide certain conveniences, but control of this can fall into the wrong hands. What threats are there for these devices and what can be done to minimize risk?

2018/05/16

Fiber Routers Vulnerable to Authentication Bug, Command Injection Via URL Change

Fiber Routers Vulnerable to Authentication Bug, Command Injection Via URL Change

Security researchers discovered an RCE vulnerability in more than a million home fiber routers.

2018/05/14

Securing the Internet of Things Through Effective Regulation

Securing the Internet of Things Through Effective Regulation

The growth in influence of the IoT also raises security concerns. With effective IoT regulation, a collaborative effort between stakeholders can be established to further develop and secure IoT systems.

2018/05/10

Flaw in Medical Devices Vulnerable to KRACK Bug, May Expose Patients’ Records

Flaw in Medical Devices Vulnerable to KRACK Bug, May Expose Patients’ Records

A flaw in medical devices’ WPA2 protocol may be exploited to change patients’ records and expose their personal information.

2018/05/09

Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground

Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground

Crime follows the money, as the saying goes, and once again, cybercriminals have acted accordingly. The underground is flooded with so many offerings of cryptocurrency malware that it must be hard for the criminals themselves to determine which is best.

2018/05/07

CEO Interview: Eva Chen Meets with ‘IIoT World’

CEO Interview: Eva Chen Meets with ‘IIoT World’

Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).

2018/05/03

Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals

Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals

Researchers found a design flaw in Alexa that can be exploited to eavesdrop and transcribe to steal all sensitive information heard.

2018/05/03

Securing the Connected Industrial World with Trend Micro

Securing the Connected Industrial World with Trend Micro

At Trend Micro we’ve made it our business over the past 30 years to anticipate where technology is taking the world. That’s why it was great to take our new message Securing the Connected World to an audience of Industry 4.0 experts at Hannover Messe last week.

2018/05/02

The Risks of Bio-IoT

The Risks of Bio-IoT

Bio-IoT: Internet of Things applied to biological systems, such as pharmaceutical delivery systems, implanted medical devices, intelligent prosthetics, surgical assistants, and remote patient monitoring.

2018/04/26

Securing IP Surveillance Cameras in the IoT Ecosystem

Securing IP Surveillance Cameras in the IoT Ecosystem

IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed denial-of-service (DDoS) attack in history.

2018/04/25

Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

In addition to recent reports of MikroTik and other IoT devices being used as part of a botnet or a scanning activity, we’ve discovered that criminals in Brazil are again targeting users of the network infrastructure behind router devices.

2018/04/24

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.

2018/04/23

Stopping Attacks on Connected Cars - Trend Micro at Hannover Messe

Stopping Attacks on Connected Cars - Trend Micro at Hannover Messe

At this year’s Hannover Messe, one of the world’s largest industrial technology trade fairs, Trend Micro showcased cybersecurity solutions for cloud applications, smart factories, and the Industrial Internet of Things (IIoT).

2018/04/22

Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More

Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More

If there is anything to be learned from the massive attacks that have been seen on connected devices, it is that the internet of things (IoT) is riddled with vulnerabilities.

PageTop