Smart Home

2019/04/18

Is Your Baby Monitor Susceptible to Hacking?

Is Your Baby Monitor Susceptible to Hacking?

In a number of high-profile cases, home surveillance cameras have been easily compromised and disturbing reports of hacked baby monitors are in the news.

2019/04/15

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro participated in the 2019 edition of Hannover Messe, which, with more than 6,000 exhibiting companies and over 200,000 visitors every year, is the world’s leading trade show for industrial technology.

2019/04/10

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

We uncovered an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet. Based on the Metasploit module it exploits, the malware targets devices with the WeMo Universal Plug and Play (UPnP) application programming interface (API).

2019/04/09

Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers

Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers

Trend Micro researchers uncovered a new variant of the notorious Mirai malware that uses multiple exploits to target various routers and internet-of-things devices.

2019/03/22

New Mirai Botnet Variant Targets IoT TV, Presentation Systems

New Mirai Botnet Variant Targets IoT TV, Presentation Systems

A new Mirai botnet variant is targeting smart signage TV and wireless presentation systems commonly used by businesses. Upgraded with 11 new exploits and default credentials for brute-forcing, enterprises are advised to patch immediately.

2019/03/11

UPnP-enabled Connected Devices in the Home and Unpatched Known Vulnerabilities

UPnP-enabled Connected Devices in the Home and Unpatched Known Vulnerabilities

Many devices such as cameras, printers, and routers use UPnP to make it easy for them to automatically discover and vet other devices on a local network and communicate with each other for data sharing or media streaming. UPnP works with network protocols to configure communications in the network. But with its convenience comes security holes that range from attackers gaining control of devices to bypassing firewall protections.

2019/03/06

Securing Smart Homes and Buildings: Threats and Risks to Complex IoT Environments

Securing Smart Homes and Buildings: Threats and Risks to Complex IoT Environments

The evolution of smart homes and smart buildings into complex IoT environments reflects the continuing developments in home and industrial automation. Security should not be left behind as increased complexity also means new threats and risks.

2018/12/17

New Exploit Kit “Novidade” Found Targeting Home and SOHO Routers

New Exploit Kit “Novidade” Found Targeting Home and SOHO Routers

We identified a new exploit kit we named Novidade that targets home or small office routers by changing their Domain Name System (DNS) settings via cross-site request forgery (CSRF), enabling attacks on a victim’s mobile device or desktop ...

2018/10/29

NTT DOCOMO Implements Trend Micro Smart Home Network™ on its newest Wi-Fi Router

NTT DOCOMO Implements Trend Micro Smart Home Network™ on its newest Wi-Fi Router

Today’s homes are filled with connected devices that usually lack the protection more often found on PCs and smartphones. To counter this, NTT DOCOMO set out to create a router that could minimize the security risks of those devices. They chose Trend Micro Smart Home Network™ for their embedded network security solution.

2018/10/03

Internet-of-Things (IoT) Security: Developments in VPNFilter and Emergence of Torii Botnet

Internet-of-Things (IoT) Security: Developments in VPNFilter and Emergence of Torii Botnet

Security researchers further shed light on VPNFilter’s additional modules whose capabilities could’ve been used for future attacks, while a new IoT botnet has emerged - Torii.

2018/09/17

Patch Now: New Mirai, Gafgyt Variants Target 16 Flaws Via Multi-Exploits

Patch Now: New Mirai, Gafgyt Variants Target 16 Flaws Via Multi-Exploits

Researchers reported that new variations of Internet of Things (IoT) botnets Mirai (Detection: Backdoor.Linux.MIRAI.AB and Gafgyt (Detection: Backdoor.Linux.GAFGYT.AA) are targeting known vulnerabilities in Apache Struts and SonicWall. Samples of the new Mirai variant target 15 vulnerabilities in Apache Struts with multiple exploits, including the flaw that caused the 2017 Equifax data breach.

2018/08/22

Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks

Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks

At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in printers. Here's how managed detection and response can help address similar threats.

2018/08/20

Carrier Grade Security Means … Using Carrier Grade Security

Carrier Grade Security Means … Using Carrier Grade Security

It’s a common mistake in enterprises to copy-paste security solutions from a peer. Strategies can be recycled, but sadly with even very similar businesses almost always have radically different IT and security requirements.

2018/08/06

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign

Security researchers uncovered a cryptojacking campaign that exploits a vulnerability in MikroTik routers to inject a malicious version of Coinhive. Here’s what you need to know.

2018/07/19

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

This blog tackles the recently ill-famed VPNFilter malware and if deployed devices are vulnerable to it. VPNFilter is a newly discovered, multi-stage malware (detected by Trend Micro as ELF_VPNFILT.A, ELF_VPNFILT.B, ELF_VPNFILT.C, and ELF_VPNFILT.D) that affects many models of connected devices.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop