• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   car hacking

2Q 2015 Security Roundup: New Hacks Threaten Public Technologies

  • Posted on:August 18, 2015 at 5:00 am
  • Posted in:Bad Sites, Internet of Things, Targeted Attacks
  • Author:
    Trend Micro
0

A supposed airline hack and other similar incidences this past quarter have made it clear: Attackers are finding more inventive ways to infiltrate and abuse existing technologies. This signals a rise in threats that go beyond just stealing data, and whose effects are more physical, evident, or close to home. Take for instance the increasing…

Read More
Tags: Adobeairplane hackAngler Exploit Kitcar hackingcybercrimeinternet of thingsPOStargeted attacks

Black Hat/DEF CON 2015: Understanding the Hands-on Imperative

  • Posted on:August 10, 2015 at 1:01 pm
  • Posted in:Social
  • Author:
    JM Hipolito (Technical Communications)
0

This year’s Black Hat and DEF CON gave us a good glimpse of the future: what we can expect, what we need to fear, and most especially what we need to do. The Dream of Internet Freedom Jennifer Granick’s keynote speech during the first day of Black Hat 2015 captured the theme of this year’s conference….

Read More
Tags: black hatcar hackingdefconinternet freedom

Is Your Car Broadcasting Too Much Information?

  • Posted on:July 28, 2015 at 2:05 am
  • Posted in:Internet of Things
  • Author:
    Rainer Link (Senior Threat Researcher)
0

Car hacking is a reality the general public will have to deal with. Nothing can be as intrusive and dangerous as strangers taking over your car while you are driving it. Last week, Valasek and Miller’s digital car-jacking stunt using 3G connectivity on a Jeep Cherokee’s infotainment system illustrated how life-threatening this situation can get….

Read More
Tags: car hackingInternet of Everythinginternet of thingsIoEIOTWi-Fi

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.