You are here:-IOT Security

Internet of Things Security

OMG Mirai Variant Turns IoT Devices Into Proxy Servers – Security News

By | 2018-03-01T03:21:50+00:00 February 27th, 2018|Categories: IOT Security|

A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers. A team of researchers discovered the new Mirai variant, which keeps Mirai’s original distributed denial-of-service (DDoS) attack capabilities but also adds and removes some of the

Comments Off on OMG Mirai Variant Turns IoT Devices Into Proxy Servers – Security News

Vulnerabilities in Apache CouchDB Open the Door to Monero Miners

By | 2018-02-26T03:21:59+00:00 February 24th, 2018|Categories: IOT Security|

by Hubert Lin Attacks abusing cryptocurrency miners have been on an upswing — in large part due to the growing popularity of digital currencies. Based on data from our sensors that we deployed worldwide, we have observed a new attack that exploits two vulnerabilities in a popular database system to deliver miners (detected

Comments Off on Vulnerabilities in Apache CouchDB Open the Door to Monero Miners

Exposed Cyber Assets in European Cities – Security News

By | 2018-02-23T10:13:20+00:00 February 22nd, 2018|Categories: IOT Security|

View Infographic: Exposed Cyber Assets in European CitiesTrend Micro’s Forward-looking Threat Research (FTR) team has focused its efforts on covering exposed cyber assets in cities across the globe, starting with U.S. cities, underscoring the need for protecting data and assets before potential compromise happens. This time, we dove into Europe, particularly Western European

Comments Off on Exposed Cyber Assets in European Cities – Security News

Diebold Nixdorf, NCR Corp. Send Out Warnings of ATM Jackpotting Attacks to US Banks – Security News

By | 2018-02-01T04:06:14+00:00 January 29th, 2018|Categories: IOT Security|

ATM manufacturers Diebold Nixdorf and NCR Corp. issued security alerts to banks on ATM jackpotting attacks, which are being detected for the first time in the United States. The warning follows a U.S. Secret Service alert that cybercriminals are using various techniques that force ATMs to “spit out” cash. In the criminal underground,

Comments Off on Diebold Nixdorf, NCR Corp. Send Out Warnings of ATM Jackpotting Attacks to US Banks – Security News

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices – Security News

By | 2018-01-29T11:20:27+00:00 January 28th, 2018|Categories: IOT Security|

Botnets that target Internet of Things (IoT) devices are neither new nor rare, with the infamous Mirai perhaps being the most popular example. However, a new botnet dubbed “Hide ‘N  Seek”, or HNS, is seemingly one of the first—along with the Hajime botnet—to use custom built peer-to-peer (P2P) communication for its infrastructure. The

Comments Off on “Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices – Security News

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices – Security News

By | 2018-01-18T10:25:32+00:00 January 17th, 2018|Categories: IOT Security|

The continuous development of Internet of Things (IoT) devices will reportedly push the global IoT market to grow from US$157 billion in 2016 to $457 billion by 2020. CES (Consumer Electronics Show), the gathering place for all those who thrive on the business of consumer technologies, hosted its annual event at the Las

Comments Off on CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices – Security News

Securing the Three Families of IoT –

By | 2018-01-12T03:17:30+00:00 January 10th, 2018|Categories: IOT Security|

Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach. IoT 0.9  The primitive group contains all legacy Operational Technology (OT) and Industrial Control Systems (ICS) that use

Comments Off on Securing the Three Families of IoT –

Source Code of IoT Botnet Satori Publicly Released on Pastebin – Security News

By | 2018-01-05T02:42:50+00:00 January 3rd, 2018|Categories: IOT Security|

The source code of the Satori internet-of-things (IoT) botnet was posted online on Pastebin, security researchers reported. In early December last year, Satori affected 280,000 IP addresses in just 12 hours, ensnaring numerous home routers to become part of its botnet. Satori (also known as Mirai Okiru, and detected by Trend Micro as

Comments Off on Source Code of IoT Botnet Satori Publicly Released on Pastebin – Security News

The Need for Better Built-in Security in IoT Devices

By | 2017-12-28T03:03:00+00:00 December 26th, 2017|Categories: IOT Security|

As manufacturers develop Internet of Things (IoT) devices that integrate with widely popular internet-based applications, more and more users see the value in purchasing such devices. Ease of integration becomes an incentive for users to consider adding these products to their network of devices. But while the ease of use can be enticing,

Comments Off on The Need for Better Built-in Security in IoT Devices

Dissecting PRILEX and CUTLET MAKER ATM Malware Families

By | 2017-12-20T03:15:07+00:00 December 18th, 2017|Categories: IOT Security|

by David Sancho and Fernando Merces For a while now, Trend Micro has focused its efforts on covering ATM malware, especially new families that come up with features that stealthily target banking customers. In this blog post, we’re going to cover two that have recently come to our attention: Prilex and Cutlet Maker. Each of

Comments Off on Dissecting PRILEX and CUTLET MAKER ATM Malware Families