• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   wearables

Risky Links: Layers and Protocols of Internet of Everything Devices

  • Posted on:September 22, 2014 at 11:12 am
  • Posted in:Internet of Things
  • Author:
    Dianne Lagrimas (Technical Communications)
0

We see the ‘cool’ when we wear or operate our smart TVs and watches and all other smart devices we own. But are we aware of how the data is processed in these devices? And where does the data we get or the data that these devices transmit end up? Most, if not all, smart…

Read More
Tags: internet of thingsInternet of ThingsIoEIOTsmartwatchwearables

The Security Implications of Wearables, Part 3

  • Posted on:September 9, 2014 at 12:00 am
  • Posted in:Internet of Things
  • Author:
    David Sancho (Senior Threat Researcher)
0

In the second post of this series, we discussed the first two types of attacks involving wearables. We will now proceed to the third type of attack, which can be considered the most damaging of the three. High User Risk, Low Feasibility Attacks These attacks are considered the most dangerous but these are also considered…

Read More
Tags: Internet of Thingswearable technologywearables

The Security Implications of Wearables, Part 2

  • Posted on:September 8, 2014 at 12:23 am
  • Posted in:Internet of Things
  • Author:
    David Sancho (Senior Threat Researcher)
0

In the previous post, we talked about the definition and categories of wearables. We will now focus our attention at possible attacks for such devices. The possibility of attacks varies largely, depending on the broad category we are focusing on. The probability of attack will increase depending on where the attack can take place. Conversely,…

Read More
Tags: Internet of Thingswearable technologywearables

The Security Implications of Wearables, Part 1

  • Posted on:September 4, 2014 at 1:10 pm
  • Posted in:Internet of Things
  • Author:
    David Sancho (Senior Threat Researcher)
0

The Internet of Everything (also known as Internet of Things) has given rise to new gadget categories in every electronics retailer shop. Smart wearables are rapidly becoming more commonplace than you think. While not everyone has Google Glass, you can bet that a lot of people have fitness trackers and even smart watches. With ‘wearable devices,’…

Read More
Tags: Internet of Thingswearable technologywearables

Wearing Your Tech on Your Sleeve

  • Posted on:August 14, 2014 at 1:34 pm
  • Posted in:Internet of Things
  • Author:
    Leo Balante (Technical Communications)
0

Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some might assume that wearable smart devices are complicated futuristic gadgets. However, they…

Read More
Tags: Internet of Thingssmart deviceswearables

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.