Internet of Things

Cities around the world are getting smarter, but are they being designed with security in mind?
Smart security systems in buildings allow for easier, centralized management of security and safety, but these connected systems also come with exploitable vulnerabilities. This infographic provides a guide for managing these systems and securing devices.
An in-depth analysis of Shodan data reveals how some of the biggest US cities fare in terms of exposed cyber assets, what this means in terms of security, and how home users and organizations can protect their data.
Cybercriminals can turn unsecure home routers into slaves for their botnets or even abuse them to steal banking credentials. Know about your router’s hidden weaknesses and the many ways you can defend your homes and businesses against these threats.
The inevitable rise of IoT homes is driving a market hungry for convenience and efficiency, but this trend is also bringing up serious concerns. Who is ultimately responsible for securing IoT homes: buyers or manufacturers?
The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.
Senior threat researcher Rainier Link talks about smart car security, the role of car manufacturers in securing vehicle systems, and security as a top consideration when creating new tech.
Part 3 of the FuTuRology project speculates on future healthcare tech that could provide opportunities for attackers and threats to healthcare users.
In this second post in the “FuTuRology” project, the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of wearables and the healthcare industry.
In this time of rampant data breaches and information theft, Trend Micro CTO Raimund Genes shares his ideas on how companies can better and more responsibly treat their users’ data.
It wouldn’t be Black Hat if the conference didn’t have demonstrations that show how some technologies can be improved. This year, a lot of topics covered the IoT, as well as drones, drones, and more drones.
A security informatics team in John Hopkins University has raised concerns over the security of drones (unmanned aerial vehicles or UAVs) after it hijacked one and sent it crashing.

 

connect with us on

facebook youtube linkedin feed