Home Security Trend Micro release tackles device security vulnerabilities

Cyber security solutions vendor Trend Micro has released a new program designed to leverage its Zero Day Initiative and to minimise vulnerabilities as smart products are developed.

According to Trend Micro, insecure devices are inadvertently fuelling a range of emerging threats, including corporate data theft and network intrusions, ransomware-related outages, sabotage of industrial equipment, and botnet-driven DDoS and crypto-mining.

“As the success of Mirai, Brickerbot and other attacks have shown, cyber criminals and nation-state actors are increasingly turning their attention to exploiting vulnerabilities in IoT devices,” said Mick McCluney, technical director, Trend Micro ANZ.

“The problem here is that patching flaws after their discovery is highly problematic. Many manufacturers may not have a software update mechanism in place, and even if patches can be issued, customers may have challenges applying them – especially large corporations with potentially thousands of IoT endpoints running in mission critical environments.”

Trend Micro says its ZDI vulnerability research program today manages the largest vendor-agnostic bug bounty program in the world with over 3,500 external researchers complementing the internal team’s efforts.

The company says that during the first half of 2018 alone, the ZDI published 600 advisories, a 33% increase compared to the same timeframe in 2017 – with SCADA and Industrial IoT vulnerabilities comprising around 30% of submissions so far this year, with the ICS-CERT the number one supplier of SCADA/ICS flaws.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Peter Dinham

Peter Dinham is a co-founder of iTWire and a 35-year veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect