German telecom giant Deutsche Telekom has teamed up with Intel Security on a joint research project to develop and deploy honey pots that can be embedded in any device, including smartphones and other connected (IoT) devices.
Deutsche Telekom’s honeypot project was started in 2010, and currently runs about 180 honeypot sensors as part of its early warning system, which identifies upwards of 600,000 attacks per day.
“Our aim is to develop the honey pot technology into a cyber-security sensor, that can be integrated into every connected device,” said Thomas Tschersich, Director IT- and physical security at Deutsche Telekom.
Both companies will jointly research how honey pots can be developed further and be integrated in every compute device, with the goal of being converted into a product available for customers.
The development of new sensors, which will leverage Intel’s hardware and security technologies, could help customers be alerted faster and enable them to be better prepared for a cyberattack, Deutsche Telekom said.
“The more threat intelligence we can gather without real organizations having to sustain cyber-attacks, the greater our collective ability to learn, anticipate and take action when real organizations must confront such attacks,” said Vincent Weafer, senior vice president, Intel Security’s McAfee Labs. “This honey pot project is unique in that it leverages the global network presence of Deutsche Telekom and the global threat intelligence and research expertise of Intel Security, raising the bar on size and scope for such operations.“
Under the alliance, the network will be expanded by adding new sensors, which will “attract criminals looking for open ports or systems that do not have the latest security software.”
For those interested in deploying their own honey pot, Deutsche Telekom’s Community Honey Pot Project offers a number of different honey pot options, along with resources, including ISO Images for Ubuntu, Scripts, and documentation.
Intel Security did not immediately respond to a SecurityWeek inquiry on which of its hardware and security technologies would be used as part of the project.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- ‘No Evidence’ of Cyberattack Related to FAA Outage, White House Says
- SecurityWeek to Host 2022 ICS Cybersecurity Conference October 24-27 in Atlanta
- Google Completes $5.4 Billion Acquisition of Mandiant
- Cybersecurity Firm ZeroFox Begins Trading on Nasdaq via SPAC Deal
- HUMAN Security and PerimeterX Merge on Mission to Combat Bots
- Last Call: CFP for ICS Cybersecurity Conference Closes July 15th
- Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks
- Snowflake Launches Cybersecurity Workload to Find Threats Across Massive Data Sets
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
