{"id":12030,"date":"2018-04-17T07:00:05","date_gmt":"2018-04-17T15:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5799\/"},"modified":"2018-04-17T07:00:05","modified_gmt":"2018-04-17T15:00:05","slug":"news-5799","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5799\/","title":{"rendered":"Advancing threat protection through industry-leading research"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 09 Apr 2018 14:25:40 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Cyber attacks look much different today, and businesses must be prepared for them.\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-440x294.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-380x254.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>At Trend Micro we\u2019ve been protecting our customers around the world for 30 years. So what\u2019s the secret to staying at the cutting edge of the industry for all this time? By investing significant resources into forward-looking threat research, we\u2019ve been able to anticipate where the black hats are going next. Over the coming weeks we\u2019ll be showcasing some of our most recent research, at both the world-famous <a href=\"https:\/\/conference.hitb.org\/hitbsecconf2018ams\/\">Hack in the Box (HITB) <\/a>and RSA Conference.<\/p>\n<p>Only by continuing to anticipate the threats of the future, can we mitigate the cyber risks of today \u2014whether that\u2019s online fraud in the travel industry, or sophisticated IoT attacks.<\/p>\n<p><strong>Consumers hit hard<\/strong><\/p>\n<p>Although much of our work is focused on protecting governments, enterprises, SMBs and service providers around the world, the threats we uncover and anticipate can also have a major impact on consumers. At HITB, we\u2019ll be discussing two such reports:<\/p>\n<p><strong>1) Taking you for a ride<\/strong><\/p>\n<p>Cyber-fraud targeting the travel and hospitality sectors is increasingly big business for the bad guys. Industry <a href=\"https:\/\/www.thepaypers.com\/digital-identity-security-online-fraud\/travel-industry-fraud-costs-businesses-and-consumers-over-usd-5-bln-per-year\/772085-26\">estimates suggest<\/a> over $1 billion in annual losses for the airline industry through ticket fraud \u2013 losses that number four times that for consumers. What\u2019s more, the percentage of travellers tricked by fraudulent websites has jumped four-fold from 2015-2017 to reach 22%, according to the American Hotel &amp; Lodging Association (AHLA).<\/p>\n<p>You can find almost anything on the dark web: from narcotics to firearms and even false passports. Increasingly, underground sites are also filled with illegal travel services paid for via stolen credit cards, hacked loyalty program accounts, and fraudulent redemption of coupons. Everything from flights and hotel accommodation to theme park tickets, tours, taxi rides and restaurant loyalty cards are available if you look in the right places. Underground travel agencies offer flights and hotel rooms at up to half price.<\/p>\n<p>Trend Micro researchers have <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/travel-hacks-how-cybercriminals-tour-the-world-on-the-cheap\">uncovered<\/a> the secrets of this illicit trade, how it\u2019s impacting consumers and businesses, and what industry players can do to fight back. We\u2019ll be revealing all at HITB.<\/p>\n<p><strong>2) The sound of a cyber-attack<\/strong><\/p>\n<p>Sometimes the most innocuous-looking devices can be leveraged by cyber-criminals to launch attacks. <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/iot-devices-need-better-builtin-security\/\">Connected speakers<\/a> are increasingly ubiquitous, both in homes and business premises. But what about the security risks? Trend Micro decided to investigate, and found a series of vulnerabilities in some well-known brands \u2014 including default configuration flaws, open diagnostic tool availability, API vulnerabilities, and more.<\/p>\n<p>Hackers could leverage these to infiltrate corporate networks and spear phish users with malware. They could even work out whether a premises or house is unoccupied and physically rob the owners using geolocation information and usage logs. Manufacturers, consumers and enterprise IT administrators must all play their part in mitigating these risks. We\u2019ll explain more at HITB.<\/p>\n<p><strong>Industrial IoT: the latest threats<\/strong><\/p>\n<p>The Internet of Things (IoT), of course, extends far beyond connected speakers. In fact, it increasingly permeates every aspect of our lives. <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3598917\">Gartner forecasts<\/a> there will be over 20 billion connected devices in use worldwide by 2020. For organizations, the rewards can be huge, offering process efficiencies, productivity gains and innovative new services to leverage internally and in customer-facing scenarios.<\/p>\n<p>However, this emerging world is fraught with risk, as our Chief Cybersecurity Officer, Ed Cabrera, will demonstrate at RSA Conference when he discusses the impact of industrial IoT (IIoT) exploits. Networks of smart devices and industrial robots offer manufacturers unprecedented opportunities to improve efficiency and productivity, reduce overheads and drive profits. But inherent weaknesses in architecture and implementation could allow attackers to spread ransomware, hijack industrial robots, sabotage processes, and steal sensitive IP.<\/p>\n<p>Ed will discuss Trend Micro and Politecnico di Milano\u2019s groundbreaking research in this area, run an attack demo on a working industrial robot, and reveal steps organizations can take to reduce their threat exposure.<\/p>\n<p>Only by arming organizations with this kind of knowledge can we finally hope to take the fight to the bad guys. That\u2019s why we\u2019ll continue to press our global team of researchers to dig deeper in finding the intelligence we need to make the digital world a safer place.<\/p>\n<p><strong>HITB<\/strong><\/p>\n<p><a href=\"https:\/\/conference.hitb.org\/hitbsecconf2018ams\/sessions\/ticket-to-ride-abusing-the-travel-and-hospitality-industry-for-profit\/\"><strong>Ticket to Ride<\/strong><\/a><strong>: Abusing the Travel and Hospitality Industry for Profit: <\/strong>Vladimir Kropotov, Fyodor Yarochkin, Mayra Fuentes, Lion Gu<\/p>\n<p>LOCATION: Track 1<\/p>\n<p>DATE: April 12, 2018<\/p>\n<p>TIME: 3:00-4:00pm<\/p>\n<p><a href=\"\/conference.hitb.org\/hitbsecconf2018ams\/sessions\/commsec-the-sound-of-a-targeted-attack-attacking-iot-speakers\/\"><strong>COMMSEC<\/strong><\/a><strong>: The Sound of a Targeted Attack: Attacking IoT Speakers: <\/strong>Stephen Hilt<\/p>\n<p>LOCATION: Track 4 \/ CommSec<\/p>\n<p>DATE: April 12, 2018<\/p>\n<p>TIME: 6:00-6:30pm<\/p>\n<p><strong>RSA Conference<\/strong><\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/speakers\/ed-cabrera\"><strong>Insecure Cities and Rogue Robots<\/strong><\/a><strong>: The Impact of Industrial IoT Exploits: <\/strong>Ed Cabrera<\/p>\n<p>Moscone Center, San Francisco<\/p>\n<p>April 18<\/p>\n<p>10.30-11am<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/advancing-threat-protection-through-industry-leading-research\/\">Advancing threat protection through industry-leading research<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/advancing-threat-protection-through-industry-leading-research\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 09 Apr 2018 14:25:40 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Cyber attacks look much different today, and businesses must be prepared for them.\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-440x294.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500-380x254.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/Cyber-attacks-look-much-different-today-and-businesses-must-be-prepared-for-them_459_40153490_0_14128733_500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>At Trend Micro we\u2019ve been protecting our customers around the world for 30 years. So what\u2019s the secret to staying at the cutting edge of the industry for all this time? By investing significant resources into forward-looking threat research, we\u2019ve been able to anticipate where the black hats are going next. Over the coming weeks&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/advancing-threat-protection-through-industry-leading-research\/\">Advancing threat protection through industry-leading research<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[18116,714],"class_list":["post-12030","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-hack-in-the-box","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12030"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12030\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}