HouseCall for Home IoT Devices
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
A security researcher reportedly discovered a new variant of Mirai (identified by Trend Micro as ELF_MIRAI family) that is quickly spreading. A notable increase in traffic on port 2323 and 23 was observed over the weekend, with around 100 thousand unique scanner IPs coming from Argentina.
Wearable internet-of-things (IoT) devices like smartwatches can help parents keep an eye on their children while also providing them the independence and connectivity they need for their lifestyle and activities.
Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.
Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One similar incident involving Google’s Home Mini speaker was discovered by Artem Russakovskii of Android Police, who reported that the device was listening and recording all the sounds it picks up in its vicinity.
Several security flaws in the Wi-Fi Protected Access 2 (WPA2) protocol were recently disclosed, which can reportedly expose wireless devices to Key Reinstallation AttaCK (KRACK), a proof-of-concept exploit that compromises WPA2’s encryption mechanism. KRACK involves “manipulating and replaying cryptographic handshake messages”—the process of establishing parameters for systems and devices to communicate with each other.
Most people are familiar with malware that encrypt files for ransom or attempts to steal information, but now cybercriminals are devoting resources to directly chasing cryptocurrency. This way, they can bypass any obstacles and directly go for a decentralized—and rapidly appreciating—currency that guarantees anonymity.
A remote access and command execution vulnerability (CVE-2016-10176) was recently seen actively exploited by RouteX, a malware that targets Netgear routers. RouteX is designed to turn an infected router into a Socket Secure (SOCKS) proxy that in turn limits access to the device to the attacker.
My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security system. She asked if her privacy might be at risk.
Households all over the world are rapidly adopting conversational user interface (CUI) technology, or the tech behind the voice assistants we know as Siri, Alexa, Cortana, and Google Assistant. Reports say that over 24 million voice-enabled machines were shipped in 2017, and the growth shows no sign of stopping. As more of these devices become available, users are quickly using them to their fullest potential, creating increasingly connected homes.
Smart home devices and applications took center stage at many tech events in 2017 from CeBIT to Computex, and even MWC 2017, as cybersecurity threats have continued to grow hand in hand with the increase of connected devices. Trend Micro Incorporated today released the “Trend Micro 2017 1H Smart Home Network Security Summary,” revealing the top 10 regions most affected by cyberattacks on a home router and identifying key factors for in-home cyber security threat.
What used to be the stuff of science fiction has turned into reality. No longer do we dream of a world where devices around us are interconnected, share information with one another, and carry out actions autonomously — we are now living in it, thanks to the so-called Internet of Things (IoT).
Every building—regardless of whether it accommodates enterprises or private owners—has security systems in place to protect valuable assets. These physical security systems range from simple access control, meaning doors and locks, to widespread surveillance systems and multiple alarms. And as these different systems grow more sophisticated, building administrators are finding ways to make managing them more convenient.
Problems with hardcoded credentials are hitting consumer IoT devices, industrial SCADA devices, and even critical infrastructure. Despite the appeal on source code and firmware audition, this type of vulnerability recurs and threatens users’ privacy and data security.
Do you know if your router has turned into a zombie? It could be part of a botnet responsible for the DDoS attacks that have been taking down company websites.
Last year, the Mirai botnet launched massive and widespread attacks by leveraging vulnerable connected devices (including routers, CCTV cameras, DVRs etc.) and turning them into weaponized zombies.
How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed?
Last year, user Y, who is based in Brazil, lost R$600 (US$191.02, as of January 30, 2017) as a side effect of information theft. Upon discovering this, Y immediately called an IT technician to find the root cause. The technician originally chalked up the incident to Y accessing a fake website.