• TOP
  • Smart Home

Smart Home

2018/08/06

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign

Security researchers uncovered a cryptojacking campaign that exploits a vulnerability in MikroTik routers to inject a malicious version of Coinhive. Here’s what you need to know.

2018/07/19

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

This blog tackles the recently ill-famed VPNFilter malware and if deployed devices are vulnerable to it. VPNFilter is a newly discovered, multi-stage malware (detected by Trend Micro as ELF_VPNFILT.A, ELF_VPNFILT.B, ELF_VPNFILT.C, and ELF_VPNFILT.D) that affects many models of connected devices.

2018/06/28

Reboot Your Smart Devices: Google Home Infrastructure Down For Hours

Reboot Your Smart Devices: Google Home Infrastructure Down For Hours

Google’s Home smart gadget infrastructure stopped working worldwide. Google released a fix that can be automatically installed after a reboot.

2018/06/21

Patch Now: Axis Cameras’ Flaws Could Give Attackers Control

Patch Now: Axis Cameras’ Flaws Could Give Attackers Control

Researchers found seven vulnerabilities in Axis cameras can be used for cyberattacks if exploited. While only POCs have been shown, customers are strongly advised to patch their firmware immediately.

2018/06/14

Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping

Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping

The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?

2018/06/04

Identifying Top Vulnerabilities in Networks: Old Vulnerabilities, IoT Botnets, Wireless Connection Exploits

Identifying Top Vulnerabilities in Networks: Old Vulnerabilities, IoT Botnets, Wireless Connection Exploits

Using our IoT Smart Checker, a tool that scans networks for potential security risks, we looked into home and other small network environments and the vulnerabilities that connected devices usually encounter. Our findings homed in on known vulnerabilities, IoT botnets with top vulnerability detections, and devices that are affected.

2018/05/30

Reboot Your Routers: VPNFilter Infected Over 500,000 Routers Worldwide

Reboot Your Routers: VPNFilter Infected Over 500,000 Routers Worldwide

VPNFilter malware has infected routers in more than 54 countries and can be used for attacks, intelligence collection, and destroying devices in a single command worldwide, affecting both enterprise and home networks.

2018/05/23

GPON Vulnerabilities Exploited for Mexico-based Mirai-like Scanning Activities

GPON Vulnerabilities Exploited for Mexico-based Mirai-like Scanning Activities

We recently found similar Mirai-like scanning activity from Mexico with some being done via the exploitation of CVE-2018-10561 and CVE-2018-10562, two vulnerabilities that are specific to Gigabit Passive Optical Network (GPON)-based home routers.

2018/05/21

Blockchain: The Missing Link Between Security and the IoT?

Blockchain: The Missing Link Between Security and the IoT?

Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?

2018/05/17

Exposed Video Streams: How Hackers Abuse Surveillance Cameras

Exposed Video Streams: How Hackers Abuse Surveillance Cameras

IP surveillance cameras provide certain conveniences, but control of this can fall into the wrong hands. What threats are there for these devices and what can be done to minimize risk?

2018/05/16

Fiber Routers Vulnerable to Authentication Bug, Command Injection Via URL Change

Fiber Routers Vulnerable to Authentication Bug, Command Injection Via URL Change

Security researchers discovered an RCE vulnerability in more than a million home fiber routers.

2018/05/03

Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals

Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals

Researchers found a design flaw in Alexa that can be exploited to eavesdrop and transcribe to steal all sensitive information heard.

2018/04/26

Securing IP Surveillance Cameras in the IoT Ecosystem

Securing IP Surveillance Cameras in the IoT Ecosystem

IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed denial-of-service (DDoS) attack in history.

2018/04/25

Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

In addition to recent reports of MikroTik and other IoT devices being used as part of a botnet or a scanning activity, we’ve discovered that criminals in Brazil are again targeting users of the network infrastructure behind router devices.

2018/04/24

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.

PageTop