Home IOT Security

IOT Security

Internet of Things Security

Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks – Security News

At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in HP OfficeJet All-in-One printers. Named “Faxploit” by the researchers, Eyal Itkin and...

Trend Micro Launches Product to Protect Telecom Networks Serving Business and Home Users

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704),...

A Look Into Smart Factories: A Model of IIoT Innovation – Security News

Organizations worldwide are integrating the internet of things (IoT) closely into how they do business, a move that is as much about keeping up with the rest of the world...

Over 200,000 MikroTik Routers Compromised in Cryptojacking Campaign – Security News

Security researchers uncovered a cryptojacking campaign — where attackers hijack systems to conduct cryptocurrency mining — that injects a malicious version of Coinhive, a web-based cryptocurrency miner, by exploiting a...

Trend Micro Survey Confirms A Disregard for the Risk of an IoT Breach and...

LONDON--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704),...

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

by Tony Yang and Peter Lee (Consumer Team) Our IoT scanning tool allows users to identify if connected devices (e.g. routers,...

Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site

by Jindrich Karasek and Loseway Lu The practicality of cryptocurrency mining on devices connected to the internet of things (IoT) is...

Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping – Security News

by Jindrich Karasek (Cyber Threat Researcher) Setting up home and small business networks is relatively simple and rudimentary. However, this could also mean that users may choose to set up their...

GPON Vulnerabilities Exploited for Mexico-based Mirai-like Scanning Activities

by Trend Micro IoT Reputation Service Team and Trend Micro Smart Home Network Team In April, we discussed our findings on...

Exposed Video Streams: How Hackers Abuse Surveillance Cameras – Security News

By: Trend Micro Forward-Looking Threat Research (FTR) Team Internet Protocol (IP) surveillance cameras afford certain conveniences in homes and businesses primarily owing to their accessibility. With these devices, it’s possible for,...