• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Rainer Link (Senior Threat Researcher)

Rainer Link

Senior Threat Researcher

Is Your Car Broadcasting Too Much Information?

  • Posted on:July 28, 2015
  • Posted in:Internet of Things
  • Posted by:
    Rainer Link (Senior Threat Researcher)
0

Car hacking is a reality the general public will have to deal with. Nothing can be as intrusive and dangerous as strangers taking over your car while you are driving it. Last week, Valasek and Miller’s digital car-jacking stunt using 3G connectivity on a Jeep Cherokee’s infotainment system illustrated how life-threatening this situation can get….

Read More
Tags: car hackingInternet of Everythinginternet of thingsIoEIOTWi-Fi

Automotive Security: Connected Cars Taking the Fast Lane

  • Posted on:February 5, 2015
  • Posted in:Internet of Things
  • Posted by:
    Rainer Link (Senior Threat Researcher)
0

Hearing about vulnerabilities in your car’s operating system might seem strange. But it’s now something we all need to get used to. Last January 30, several security loopholes in BMW’s ConnectedDrive system, that could allow potential thieves to unlock doors and track car data using a mobile device, as the security gap may affect the transmission path via the…

Read More
Tags: internet of thingsInternet of Thingssmart car

Smart Grid Attack Scenarios

  • Posted on:July 23, 2014
  • Posted in:Internet of Things, Vulnerabilities
  • Posted by:
    Rainer Link (Senior Threat Researcher)
0

This is the third (and last) in a series of posts looking at the threats surrounding smart grids and smart meters. In the first post, we introduced smart meters, smart grids, and showed why these can pose risks. In the second post, we looked at the risks of attacks on smart meters. In this post,…

Read More
Tags: internet of thingsInternet of ThingsIoEIOTsmart gridsmart homesmart meters

Smart Meter Attack Scenarios

  • Posted on:July 21, 2014
  • Posted in:Exploits, Internet of Things, Vulnerabilities
  • Posted by:
    Rainer Link (Senior Threat Researcher)
1

In our previous post, we looked at how smart meters were being introduced across multiple countries and regions, and why these devices pose security risks to their users. At their heart, a smart meter is simply… a computer. Let’s look at our existing computers – whether they are PCs, smartphones, tablets, or embedded devices. Similarly, these…

Read More
Tags: Internet of Thingssmart meters

Introduction to Smart Meters

  • Posted on:July 14, 2014
  • Posted in:Exploits, Internet of Things, Vulnerabilities
  • Posted by:
    Rainer Link (Senior Threat Researcher)
1

While wearable personal technology may be the most “public” face of the Internet of Everything, the most widespread use of it may be in smart meters. What is a smart meter, exactly? It’s a meter for utilities (electricity, gas, or water) that records the consumption of the utility in question, and transmits it to the utility…

Read More
Tags: Internet of Thingssmart devicessmart meter
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.