Smart Home

2018/05/17

Exposed Video Streams: How Hackers Abuse Surveillance Cameras

Exposed Video Streams: How Hackers Abuse Surveillance Cameras

IP surveillance cameras provide certain conveniences, but control of this can fall into the wrong hands. What threats are there for these devices and what can be done to minimize risk?

2018/05/16

Fiber Routers Vulnerable to Authentication Bug, Command Injection Via URL Change

Fiber Routers Vulnerable to Authentication Bug, Command Injection Via URL Change

Security researchers discovered an RCE vulnerability in more than a million home fiber routers.

2018/05/03

Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals

Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals

Researchers found a design flaw in Alexa that can be exploited to eavesdrop and transcribe to steal all sensitive information heard.

2018/04/26

Securing IP Surveillance Cameras in the IoT Ecosystem

Securing IP Surveillance Cameras in the IoT Ecosystem

IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed denial-of-service (DDoS) attack in history.

2018/04/25

Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

In addition to recent reports of MikroTik and other IoT devices being used as part of a botnet or a scanning activity, we’ve discovered that criminals in Brazil are again targeting users of the network infrastructure behind router devices.

2018/04/24

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.

2018/04/22

Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More

Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More

If there is anything to be learned from the massive attacks that have been seen on connected devices, it is that the internet of things (IoT) is riddled with vulnerabilities.

2018/04/20

Threats to Voice-Based IoT and IIoT Devices

Threats to Voice-Based IoT and IIoT Devices

According to one estimate, 33 million "voice-first" devices would have already been shipped by the end of last year. Given the staggering number of voice-based internet-of-things (IoT) devices that are apparently in use around the world, it’s worth noting that security for these devices should become a top priority.

2018/04/09

Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces

Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces

Every year, Black Hat Asia gathers security researchers and enthusiasts alike to demonstrate how technologies and applications can be improved. Last year, researchers delved into vulnerabilities and exploits that affected devices on the internet of things (IoT). This year is no different, as the conference has brought forth more hacks and concerns around the IoT. And one affected field in particular may be a little too close for comfort: wearables.

2018/03/27

Trend Micro Debunks Common Home Network Security Myths

Trend Micro Debunks Common Home Network Security Myths

For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.

2018/02/28

OMG Mirai Variant Turns IoT Devices Into Proxy Servers

OMG Mirai Variant Turns IoT Devices Into Proxy Servers

A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers.

2018/02/27

A Look Into the Most Noteworthy Home Network Security Threats of 2017

A Look Into the Most Noteworthy Home Network Security Threats of 2017

Home intrusions are often pictured in the form of physical break-ins. The current reality of having many internet-connected devices in the home, however, has given rise to another type of intruder — one whose point of entry is the home network, where connected devices are potentially open to compromise.

2018/02/04

Data Privacy in the Age of IoT

Data Privacy in the Age of IoT

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT — the Internet of Things?

2018/01/29

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

Botnets that target Internet of Things (IoT) devices are neither new nor rare, with the infamous Mirai perhaps being the most popular example. However, a new botnet dubbed “Hide ‘N Seek”, or HNS, is seemingly one of the first—along with the Hajime botnet—to use custom built peer-to-peer (P2P) communication for its infrastructure. The botnet has affected over 24,000 devices, including devices in the U.S. and Asia, as of the time of publication.

2018/01/18

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

The continuous development of Internet of Things (IoT) devices will reportedly push the global IoT market to grow from US$157 billion in 2016 to $457 billion by 2020. CES (Consumer Electronics Show), the gathering place for all those who thrive on the business of consumer technologies, hosted its annual event at the Las Vegas Convention Center to showcase what’s in store for the market this year.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop