Quantcast
Channel: TrendLabs Security Intelligence Blog » Internet of Everything
Browsing all 17 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Smart Grid Attack Scenarios

This is the third (and last) in a series of posts looking at the threats surrounding smart grids and smart meters. In the first post, we introduced smart meters, smart grids, and showed why these can...

View Article



The Role of Smartphones in the Internet of Everything

Ever since the mobile boom, smartphones have become an integral part of our lives, enough that they’ve become virtually indispensable in today’s fast-paced world. Not only do they serve to connect us...

View Article

DEF CON 22 Turns up the Heat on Devices

One resounding – but unsurprising – message from this year’s DEF CON conference in Las Vegas, Nevada was the increase in hacks against IoT devices. The lineup of hacked IoT devices was extensive. Many...

View Article

Wearing Your Tech on Your Sleeve

Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see...

View Article

Image may be NSFW.
Clik here to view.

The Administrator of Things (AoT) – A Side Effect of Smartification

In an earlier article, we talked about the ongoing smartification of the home – the natural tendency of households to accumulate more intelligent devices over time. While this has its benefits, the...

View Article


The Security Implications of Wearables, Part 1

The Internet of Everything (also known as Internet of Things) has given rise to new gadget categories in every electronics retailer shop. Smart wearables are rapidly becoming more commonplace than you...

View Article

Image may be NSFW.
Clik here to view.

The Security Implications of Wearables, Part 2

In the previous post, we talked about the definition and categories of wearables. We will now focus our attention at possible attacks for such devices. The possibility of attacks varies largely,...

View Article

Image may be NSFW.
Clik here to view.

The Security Implications of Wearables, Part 3

In the second post of this series, we discussed the first two types of attacks involving wearables. We will now proceed to the third type of attack, which can be considered the most damaging of the...

View Article


Risky Links: Layers and Protocols of Internet of Everything Devices

We see the ‘cool’ when we wear or operate our smart TVs and watches and all other smart devices we own. But are we aware of how the data is processed in these devices? And where does the data we get or...

View Article


Is Your Data Safe In The Internet of Everything?

I prefer using the phrase “Internet of Everything” when discussing what most people call the Internet of Things because in many ways, the latter term isn’t enough. What makes the Internet of Everything...

View Article

Image may be NSFW.
Clik here to view.

Sandworm to Blacken: The SCADA Connection

On October 14th, a report was publicly released regarding the Sandworm team.  After beginning an investigation into the affiliated malware samples and domains, we quickly came to realization that this...

View Article

Smart Lock Devices: Security Risks and Opportunities

Security is one of the top concerns when consumers consider buying smart devices. With cybercrime making the headlines every day, one has to think: is this smart device vulnerable to cyber attacks? Are...

View Article

2015 Predictions: The Invisible Becomes Visible

2014 brought with it many significant additions to the technology landscape. These put new capabilities into the hands of users and companies that allowed them to do things that they would not have...

View Article


Image may be NSFW.
Clik here to view.

BASHLITE Affects Devices Running on BusyBox

When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how...

View Article

Image may be NSFW.
Clik here to view.

Security of Home Surveillance Cameras

Home surveillance/security cameras have been available for quite some time, and can be used to keep track of one’s home, children, pets, or business.  These devices are, in some ways, the first...

View Article


Automotive Security: Connected Cars Taking the Fast Lane

Hearing about vulnerabilities in your car’s operating system might seem strange. But it’s now something we all need to get used to. Last January 30, several security loopholes in BMW’s ConnectedDrive...

View Article

Image may be NSFW.
Clik here to view.

Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?

With analysis and research by Stephen Hilt (Independent Researcher) Even as attacks on SCADA devices has become more public, devices are constantly being reported as Internet-facing and thus,...

View Article

Browsing all 17 articles
Browse latest View live




Latest Images