• About
  • Advertise
  • Careers
  • Contact
Thursday, February 2, 2023
No Result
View All Result
NEWSLETTER
iotsanjose
  • Home
  • IoT
  • Smart Cities
  • Data & Analytics
  • Enterprise
  • Development
  • Security
  • Home
  • IoT
  • Smart Cities
  • Data & Analytics
  • Enterprise
  • Development
  • Security
No Result
View All Result
iotsanjose
No Result
View All Result
Home IoT

Trend Micro blocked five million IoT camera hack attempts

by iotadmin
July 28, 2019
in IoT, Security, Smart Cities, Smart Homes
0
Trend Micro blocked five million IoT camera hack attempts
0
SHARES
25
VIEWS
Share on FacebookShare on Twitter

Cybersecurity experts from Trend Micro blocked five million attempted hacks of IoT cameras.

IP cameras have become a prime target for hackers. Viewing inside someone’s home or business has clear advantages for someone with malicious intent. This could involve blackmail, or even seeing what items a property holds and whether anyone is around.

Other key reasons provided by Trend Micro for hackers targeting IP cameras include:

  • Constant connectivity. Like many other devices, IP cameras need to be internet-connected to function properly. However, exposure to the internet also makes it easy for hackers to find the cameras and potentially exploit the devices. Once hacked, the devices will be able to serve the hackers’ needs.

  • Low hacking investment. Unlike with hacking a PC, once hackers see a way to break the security of an IoT device such as an IP camera, the same approach can usually be applied to other devices of similar models, resulting in a very low per-device hacking cost.

  • Lack of supervision. Unlike PCs, especially those used in offices, IP cameras have low user interaction and are not well-managed in terms of security. Installation of an aftermarket anti-malware application is not available either.

  • High performance. The idle computing power of an IP surveillance camera is usually good enough to perform hacking-related tasks such as cryptocurrency mining, and without being noticed by end users at that.

  • High internet-facing bandwidth. The always-connected, fast, and huge bandwidth designed for video communications makes for a suitable target for hackers to initiate DDoS attacks.

Many cameras – especially cheap imported devices – often don’t prompt users to change default passwords, meaning they can be compromised with very little expertise. Some websites even provide a directory of vulnerable cameras that can be streamed.

Trend Micro teamed up with IP security solution provider VIVOTEK in a bid to secure IoT cameras. Data from 7,000 IP cameras were analysed by Trend Micro to find the scale of the threat against them, and how few protections they have.

“While the industry has known about cyber risks, manufacturers have been unable to properly address the risk without knowing the root cause and attack methods,” comments Dr Steve Ma, VP of Engineering, Brand Business Group at VIVOTEK.

VIVOTEK’s own IP cameras have Trend Micro’s IoT Reputation Service embedded to offer the first surveillance devices with brute force attack protection and hosted IPS.

Oscar Chang, Executive Vice President and Chief Development Officer at Trend Micro, said:

“More verticals are seeking connected, AI-powered video surveillance applications causing a clear paradigm shift from a relatively closed-off network to a more interconnected network operated heavily by cloud-based technologies.

Due to this shift in the landscape, manufacturers and users must pay attention to the security of these IoT devices, and Trend Micro is committed to securing today’s increasingly connected environment.”

Trend Micro’s analysis found 75 percent of blocked attacks were brute force login attempts. The cybersecurity giant says it shows ‘a clear pattern’ that devices are being targeted with common malware, such as Mirai.

A ‘shared responsibility’ model has been suggested by Trend Micro in a bid to tackle video surveillance threats. “Complete end-to-end protection and risk awareness is key to a secured video system – involving manufacturers, service providers, system integrators and end users,” the company says.

https://www.iottechexpo.com/wp-content/uploads/2018/09/iot-tech-expo-world-series.pngInterested in hearing industry leaders discuss subjects like this? Attend the IoT Tech Expo World Series events with upcoming shows in Silicon Valley, London, and Amsterdam.

Related Stories
Download WordPress Themes
Download Nulled WordPress Themes
Download Nulled WordPress Themes
Download Premium WordPress Themes Free
download udemy paid course for free
download intex firmware
Download Premium WordPress Themes Free
udemy course download free
Tags: Trend Micro blocked five million IoT camera hack attempts
iotadmin

iotadmin

Next Post
FIDO Alliance announces new identity verification initiatives

FIDO Alliance announces new identity verification initiatives

Recommended

Andrew Ng’s AI Transformation Playbook shares key lessons

4 years ago
Consumer Watchdog: Mass cyberattack could result in control of connected cars

Consumer Watchdog: Mass cyberattack could result in control of connected cars

3 years ago

Buy CBD Online

  • CBD Oils
  • CBG
  • Sleep spray
  • CBD gummies
  • buy CBD oil
  • Dab pens
  • CBD Patches
  • CBD pills
  • Pet CBD
  • CBD for pain
  • CBD for sleep
  • CBD Flower
Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • New Connections
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Sanjose USA

© 2019-20 iotsanjose.com.

No Result
View All Result
  • Home
  • IoT
  • Smart Cities
  • Data & Analytics
  • Enterprise
  • Development
  • Connected Cars
  • AI
  • Security
  • IIoT
  • Standards

© 2019-20 iotsanjose.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In