• About
  • Advertise
  • Contact
Saturday, January 23, 2021
No Result
View All Result
NEWSLETTER
iotsandiego
  • Home
  • IoT
  • Smart Cities
  • Data & Analytics
  • Enterprise
  • Development
  • Connected Cars
  • Security
  • AI
  • IIoT
  • Standards
  • Home
  • IoT
  • Smart Cities
  • Data & Analytics
  • Enterprise
  • Development
  • Connected Cars
  • Security
  • AI
  • IIoT
  • Standards
No Result
View All Result
iotsandiego
No Result
View All Result
Home IoT

Trend Micro blocked five million IoT camera hack attempts

by iotadmin
July 28, 2019
in IoT, Security, Smart Cities, Smart Homes
0
Trend Micro blocked five million IoT camera hack attempts
0
SHARES
14
VIEWS
Share on FacebookShare on Twitter

Cybersecurity experts from Trend Micro blocked five million attempted hacks of IoT cameras.

IP cameras have become a prime target for hackers. Viewing inside someone’s home or business has clear advantages for someone with malicious intent. This could involve blackmail, or even seeing what items a property holds and whether anyone is around.

Other key reasons provided by Trend Micro for hackers targeting IP cameras include:

  • Constant connectivity. Like many other devices, IP cameras need to be internet-connected to function properly. However, exposure to the internet also makes it easy for hackers to find the cameras and potentially exploit the devices. Once hacked, the devices will be able to serve the hackers’ needs.

  • Low hacking investment. Unlike with hacking a PC, once hackers see a way to break the security of an IoT device such as an IP camera, the same approach can usually be applied to other devices of similar models, resulting in a very low per-device hacking cost.

  • Lack of supervision. Unlike PCs, especially those used in offices, IP cameras have low user interaction and are not well-managed in terms of security. Installation of an aftermarket anti-malware application is not available either.

  • High performance. The idle computing power of an IP surveillance camera is usually good enough to perform hacking-related tasks such as cryptocurrency mining, and without being noticed by end users at that.

  • High internet-facing bandwidth. The always-connected, fast, and huge bandwidth designed for video communications makes for a suitable target for hackers to initiate DDoS attacks.

Many cameras – especially cheap imported devices – often don’t prompt users to change default passwords, meaning they can be compromised with very little expertise. Some websites even provide a directory of vulnerable cameras that can be streamed.

Trend Micro teamed up with IP security solution provider VIVOTEK in a bid to secure IoT cameras. Data from 7,000 IP cameras were analysed by Trend Micro to find the scale of the threat against them, and how few protections they have.

“While the industry has known about cyber risks, manufacturers have been unable to properly address the risk without knowing the root cause and attack methods,” comments Dr Steve Ma, VP of Engineering, Brand Business Group at VIVOTEK.

VIVOTEK’s own IP cameras have Trend Micro’s IoT Reputation Service embedded to offer the first surveillance devices with brute force attack protection and hosted IPS.

Oscar Chang, Executive Vice President and Chief Development Officer at Trend Micro, said:

“More verticals are seeking connected, AI-powered video surveillance applications causing a clear paradigm shift from a relatively closed-off network to a more interconnected network operated heavily by cloud-based technologies.

Due to this shift in the landscape, manufacturers and users must pay attention to the security of these IoT devices, and Trend Micro is committed to securing today’s increasingly connected environment.”

Trend Micro’s analysis found 75 percent of blocked attacks were brute force login attempts. The cybersecurity giant says it shows ‘a clear pattern’ that devices are being targeted with common malware, such as Mirai.

A ‘shared responsibility’ model has been suggested by Trend Micro in a bid to tackle video surveillance threats. “Complete end-to-end protection and risk awareness is key to a secured video system – involving manufacturers, service providers, system integrators and end users,” the company says.

https://www.iottechexpo.com/wp-content/uploads/2018/09/iot-tech-expo-world-series.pngInterested in hearing industry leaders discuss subjects like this? Attend the IoT Tech Expo World Series events with upcoming shows in Silicon Valley, London, and Amsterdam.

Related Stories
Download Best WordPress Themes Free Download
Premium WordPress Themes Download
Free Download WordPress Themes
Download WordPress Themes
free online course
download redmi firmware
Premium WordPress Themes Download
free online course
Tags: Trend Micro blocked five million IoT camera hack attempts
iotadmin

iotadmin

Next Post
The future of factories in an IoT-driven world: Budget and data challenges and opportunities

The future of factories in an IoT-driven world: Budget and data challenges and opportunities

Leave a Reply Cancel reply

Your email address will not be published.

Recommended

Sidewalk Labs reaches a deal to move forward with smart city, albeit scaled back

Sidewalk Labs reaches a deal to move forward with smart city, albeit scaled back

1 year ago
Contractors targeted homeless with ‘dark skin’ to train Google’s facial recognition

Contractors targeted homeless with ‘dark skin’ to train Google’s facial recognition

1 year ago

Buy CBD Online

  • CBD Oils
  • CBG
  • Sleep spray
  • CBD gummies
  • buy CBD oil
  • Dab pens
  • CBD Patches
  • CBD pills
  • Pet CBD
  • CBD for pain
  • CBD for sleep
  • CBD Flower
Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest Updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Uncategorized
  • Wearables

About Us

Get updated with latest IOT related news and information with us.

© 2019-20 iotsandiego.com.

No Result
View All Result
  • Home
  • IoT
  • Smart Cities
  • Data & Analytics
  • Enterprise
  • Development
  • Connected Cars
  • Security
  • AI
  • IIoT
  • Standards

© 2019-20 iotsandiego.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In