HouseCall for Home Networks
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
Trend Micro participated in the 2019 edition of Hannover Messe, which, with more than 6,000 exhibiting companies and over 200,000 visitors every year, is the world’s leading trade show for industrial technology.
DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced a strategic partnership with Luxoft Holding, Inc. (NYSE: LXFT), a global digital strategy and engineering firm.
Security researchers uncovered vulnerabilities in third-party car alarms managed via their mobile applications, affecting around 3 million cars. Here's what you need to know.
At this year’s Hannover Messe, one of the world’s largest industrial technology trade fairs, Trend Micro showcased cybersecurity solutions for cloud applications, smart factories, and the Industrial Internet of Things (IIoT).
Researchers from the University of Michigan have shown that connected vehicle-based transportation systems can be interfered with using a single attack vehicle. Their research demonstrates how identifying a data spoofing strategy on one connected car can trick a traffic system into believing that an intersection is congested through vehicle-to-infrastructure (V2I) communication.
In the history of mandatory regulation of computerized vehicles, an E-Letter entitled, “Black box is not safe at all,” was published. It mentioned that on-board diagnostics (OBD-II) specifications were made mandatory for all cars sold in the United States in 1996. The European Union made European OBD (EOBD) mandatory for all gasoline (petrol) vehicles sold in the European Union starting in 2001.
For the first time, a pedestrian was killed in an incident associated with self-driving technology. The fatal occurrence happened in Tempe, Arizona, on March 18 at around 10 p.m.
Panasonic Corporation and Trend Micro Incorporated today announced a partnership to jointly develop a cyber-security solution to detect and prevent cyber-attacks against autonomous and connected cars.
The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks are now a reality that they have to grapple with.
As cars become more connected and smarter, security requirements for automotive systems are constantly growing. Trend Micro today announced that Trend Micro IoT Security supports Mentor Automotive ConnectedOS™ from Mentor, a Siemens business.
Securing the physical and cyber infrastructure of an ITS is a huge undertaking for all stakeholders. What would it take to secure and protect such a massive system against cyber threats, especially for those who are or will be responsible for one (i.e., a Chief Information Security Officer [CISO])? The first step is to know what the threats are and which ITS components are high risk.
Connected cars and autonomous vehicles are getting all the headlines these days, especially when it comes to cybersecurity concerns. But that’s only half of the story. An under-reported but hugely important piece of the puzzle relates to the Intelligent Transportation Systems (ITS) needed to create truly smart cities. Governments around the world, including the US, are already investing in these systems – and cyber attacks on them are already beginning to make the news.
Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.
Electronics designer Tom Wimmenhove recently uncovered a vulnerability in the key fob system that car manufacturer Subaru uses for several of its vehicles. When exploited successfully, it can enable hackers or thieves to clone the key fob to the access the vehicle.
In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. This hack and those that have come before it have mostly been reliant on specific vulnerabilities in specific makes and/or brands of cars.