Smart Home

2019/11/12

Amazon Patches Ring Video Doorbell Pro Vulnerability That Threatens Network Security

Amazon Patches Ring Video Doorbell Pro Vulnerability That Threatens Network Security

Researchers discovered a vulnerability in Amazon’s Ring Video Doorbell Pro that, if exploited, could allow a threat actor to get network or Wi-Fi credentials. Amazon has already fixed this issue back in September but the vulnerability was only disclosed recently.

2019/11/04

The First Steps in Effective IoT Device Security

The First Steps in Effective IoT Device Security

As we integrate more IoT devices into important operations, and store sensitive data in them, we also have to wrestle with the problem of security.

2019/10/28

Alexa and Google Home Devices can be Abused to Phish and Eavesdrop on Users, Research Finds

Alexa and Google Home Devices can be Abused to Phish and Eavesdrop on Users, Research Finds

Researchers at Security Research Labs (SRL) demonstrated how applications (called Skills in Amazon Alexa and Actions on Google Home) can be used to exploit security issues in the ways certain device functions are operated through the apps.

2019/09/05

Finding a Better Route to Router and Home Network Security

Finding a Better Route to Router and Home Network Security

When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box ...

2019/08/14

Back-to-Back Campaigns: Neko, Mirai, and Bashlite Malware Variants Use Various Exploits to Target Several Routers, Devices

Back-to-Back Campaigns: Neko, Mirai, and Bashlite Malware Variants Use Various Exploits to Target Several Routers, Devices

Within a span of three weeks, our telemetry uncovered three notable malware variants of Neko, Mirai, and Bashlite. On July 22, 2019, we saw and started analyzing a Neko botnet sample, then observed another sample with additional exploits the following week.

2019/08/12

Mirai Spawn Echobot Found Using Over 50 Different Exploits

Mirai Spawn Echobot Found Using Over 50 Different Exploits

Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.

2019/08/05

Keeping a Hidden Identity: Mirai C&Cs in Tor Network

Keeping a Hidden Identity: Mirai C&Cs in Tor Network

With its notoriety for being one of the most active internet of things (IoT) malware families, Mirai is one malware family system administrators consistently keep their eye on to make sure systems and devices are protected.

2019/07/31

Inside the Smart Home: IoT Device Threats and Attack Scenarios

Inside the Smart Home: IoT Device Threats and Attack Scenarios

A smart home is made up of a number of different devices connected to the internet of things (IoT), each with a specific set of functions. No matter how different these devices are from one another, they have the shared goal of streamlining the tasks and simplifying the lives of their users.

2019/05/23

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

We discovered a new variant of Mirai (detected as Backdoor.Linux.MIRAI.VWIPT) that uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks.

2019/05/22

Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate.

2019/05/08

Are Your Devices at Risk? Find out with HouseCall for Home Networks

Are Your Devices at Risk? Find out with HouseCall for Home Networks

HouseCall for Home Networks is a free and easy-to-use Trend Micro solution that scans your Wi-Fi connected devices and checks them for security risks to protect you from hackers, privacy leaks, and other threats.

2019/04/18

Is Your Baby Monitor Susceptible to Hacking?

Is Your Baby Monitor Susceptible to Hacking?

In a number of high-profile cases, home surveillance cameras have been easily compromised and disturbing reports of hacked baby monitors are in the news.

2019/04/15

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro participated in the 2019 edition of Hannover Messe, which, with more than 6,000 exhibiting companies and over 200,000 visitors every year, is the world’s leading trade show for industrial technology.

2019/04/10

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

We uncovered an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet. Based on the Metasploit module it exploits, the malware targets devices with the WeMo Universal Plug and Play (UPnP) application programming interface (API).

2019/04/09

Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers

Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers

Trend Micro researchers uncovered a new variant of the notorious Mirai malware that uses multiple exploits to target various routers and internet-of-things devices.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop