Category: IOT Security

Internet of Things Security

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

The ‘WannaCry” and “Petya” (also known as NotPetya or GoldenEye) outbreaks rank as the most damaging global cyber security incidents during the first half of 2017. These massive ransomware attacks impacted the networks of hospitals, factories, and railroads in many...

/ November 5, 2017

Taking Steps towards Secure Manufacturing – Security News

In 2016, an independent study recognized the manufacturing industry as the second most attacked industry. While the healthcare sector is still the most frequently attacked, attacks on manufacturing come as no surprise since it’s an expansive industry that includes the...

/ November 1, 2017

Security Risks in a Technology-Driven World – Security News

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides. The interconnectivity that ties all...

/ October 22, 2017

Google Home Mini Speaker Discovered Eavesdropping on Home User – Security News

Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One similar incident involving Google’s Home Mini speaker was discovered by...

/ October 18, 2017

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

DALLAS–(BUSINESS WIRE)–The need for strong and reliable threat defense is critical to everyday operations and becomes more important as high profile attacks continue to increase. Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, attained a...

/ October 18, 2017

TrendLabs Security Intelligence BlogDnsmasq: A Reality Check and Remediation Practices

Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq...

/ October 17, 2017

Vulnerabilities in WPA2 Reportedly Expose Wi-Fi-Enabled Devices to Eavesdropping – Security News

Several security flaws in the Wi-Fi Protected Access 2 (WPA2) protocol were recently disclosed, which can reportedly expose wireless devices to Key Reinstallation AttaCK (KRACK), a proof-of-concept exploit that compromises WPA2’s encryption mechanism. KRACK involves “manipulating and replaying cryptographic handshake...

/ October 16, 2017

Siemens Update Addresses Critical Vulnerability Found in Measuring Device – Security News

Siemens recently issued an update that addresses a vulnerability found in one of their measuring devices that could potentially allow an attacker to bypass built-in authentication measures and take control of the machine. Discovered by researcher Maxim Rupp, CVE-2017-9944 affects...

/ October 15, 2017

By the Numbers: Are Your Smart Home Devices Being Used as Cryptocurrency Miners? – Security News

Most people are familiar with malware that encrypt files for ransom or attempts to steal information, but now cybercriminals are devoting resources to directly chasing cryptocurrency. This way, they can bypass any obstacles and directly go for a decentralized—and rapidly...

/ October 11, 2017

Integrating Security Into the IoT Strategy in the New Converged Environment

General business and threat landscape in the IT and OT environments The rise of the Internet of Things (IoT) started when consumers began to interconnect home, work and mobile devices via the cloud so that valuable personal and work information...

/ October 10, 2017