• TOP
  • Smart Home

Smart Home

2018/04/20

Threats to Voice-Based IoT and IIoT Devices

Threats to Voice-Based IoT and IIoT Devices

According to one estimate, 33 million "voice-first" devices would have already been shipped by the end of last year. Given the staggering number of voice-based internet-of-things (IoT) devices that are apparently in use around the world, it’s worth noting that security for these devices should become a top priority.

2018/04/09

Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces

Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces

Every year, Black Hat Asia gathers security researchers and enthusiasts alike to demonstrate how technologies and applications can be improved. Last year, researchers delved into vulnerabilities and exploits that affected devices on the internet of things (IoT). This year is no different, as the conference has brought forth more hacks and concerns around the IoT. And one affected field in particular may be a little too close for comfort: wearables.

2018/03/27

Trend Micro Debunks Common Home Network Security Myths

Trend Micro Debunks Common Home Network Security Myths

For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.

2018/02/28

OMG Mirai Variant Turns IoT Devices Into Proxy Servers

OMG Mirai Variant Turns IoT Devices Into Proxy Servers

A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers.

2018/02/27

A Look Into the Most Noteworthy Home Network Security Threats of 2017

A Look Into the Most Noteworthy Home Network Security Threats of 2017

Home intrusions are often pictured in the form of physical break-ins. The current reality of having many internet-connected devices in the home, however, has given rise to another type of intruder — one whose point of entry is the home network, where connected devices are potentially open to compromise.

2018/02/04

Data Privacy in the Age of IoT

Data Privacy in the Age of IoT

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT — the Internet of Things?

2018/01/29

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

Botnets that target Internet of Things (IoT) devices are neither new nor rare, with the infamous Mirai perhaps being the most popular example. However, a new botnet dubbed “Hide ‘N Seek”, or HNS, is seemingly one of the first—along with the Hajime botnet—to use custom built peer-to-peer (P2P) communication for its infrastructure. The botnet has affected over 24,000 devices, including devices in the U.S. and Asia, as of the time of publication.

2018/01/18

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

The continuous development of Internet of Things (IoT) devices will reportedly push the global IoT market to grow from US$157 billion in 2016 to $457 billion by 2020. CES (Consumer Electronics Show), the gathering place for all those who thrive on the business of consumer technologies, hosted its annual event at the Las Vegas Convention Center to showcase what’s in store for the market this year.

2018/01/04

Source Code of IoT Botnet Satori Publicly Released on Pastebin

Source Code of IoT Botnet Satori Publicly Released on Pastebin

In early December last year, Satori affected 280,000 IP addresses in just 12 hours, ensnaring numerous home routers to become part of its botnet.

2017/12/27

The Need for Better Built-in Security in IoT Devices

The Need for Better Built-in Security in IoT Devices

To see just how safe and secure IoT devices are and to what extent an attacker can manipulate an IoT device, we tested the built-in security of a particular IoT device type — internet-connected speakers.

2017/12/21

5 Smart Ways to Enjoy a Hack-Free Holiday

 5 Smart Ways to Enjoy a Hack-Free Holiday

'Tis the season to be jolly ... and enjoy your holiday haul! New gear normally arrives at this time of year (maybe an iPhone X?), but new devices come with new risks. Even if you have smart online shopping habits, your new tech can put your privacy in jeopardy, or worse.

2017/12/04

New Mirai Attack Attempts Detected in South America and North African Countries

New Mirai Attack Attempts Detected in South America and North African Countries

Just a few days ago, the notorious Internet of Things (IoT) botnet known as Mirai (detected by Trend Micro as ELF_MIRAI family) was detected as being active in a new campaign targeting Argentina, when red flags were raised after an increase in traffic on ports 2323 and 23.

2017/11/27

New Mirai Variant Found Spreading like Wildfire

New Mirai Variant Found Spreading like Wildfire

A security researcher reportedly discovered a new variant of Mirai (identified by Trend Micro as ELF_MIRAI family) that is quickly spreading. A notable increase in traffic on port 2323 and 23 was observed over the weekend, with around 100 thousand unique scanner IPs coming from Argentina.

2017/11/15

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Wearable internet-of-things (IoT) devices like smartwatches can help parents keep an eye on their children while also providing them the independence and connectivity they need for their lifestyle and activities.

2017/10/23

Security Risks in a Technology-Driven World

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

PageTop