HackDig : Dig high-quality web security articles for hacker

DDoS attacks in Q3 2019

News overview This past quarter we observed a new DDoS attack that confirmed our earlier hypothesis regarding attacks through the Memcached protocol. As we surmised, the attackers attempted to use another, rather exotic protocol to amplify DDoS attacks. Experts at Akamai Technologies recently registered an attack on one of their clients that was carried out
Publish At:2019-11-12 01:05 | Read:80 | Comments:0 | Tags:DDoS reports Featured Botnets DDoS-attacks DNS Amplification

IoT: a malware story

Since 2008, cyber-criminals have been creating malware to attack IoT-devices, such as routers and other types of network equipment. You will find a lot of statistics on this on Securelist, most notably, here and here. The main problem with these IoT/embedded devices is that one simply cannot install any kind of security software. How do we deal with that? Th
Publish At:2019-10-15 06:20 | Read:198 | Comments:0 | Tags:Featured Malware reports Backdoor Botnets honeypot Internet

A glimpse into the present state of security in robotics

 Download full report (PDF) The world of today continues its progress toward higher digitalization and mobility. From developments in the Internet of Things (IoT) through augmented reality to Industry 4.0, whichrely on stronger automation and use of robots, all of these bring more efficiency to production processes and improves user experience across th
Publish At:2019-10-14 06:20 | Read:295 | Comments:0 | Tags:Featured Publications Internet of Things Security technology

McAfee Receives the 2019 Security Excellence Award From IoT Evolution

If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether it be voice assistants, smart TVs, thermostats, or gaming systems, IoT devices help make our lives easier. But with greater connectivity also comes greater exposure to online threats. However, that doesn’t mean users shou
Publish At:2019-09-30 23:20 | Read:307 | Comments:0 | Tags:Consumer cybersafety cybersecurity Internet of Things IoT

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:463 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

IT threat evolution Q2 2019

Targeted attacks and malware campaigns More about ShadowHammer In March, we published the results of our investigation into a sophisticated supply-chain attack involving the ASUS Live Update Utility, used to deliver BIOS, UEFI and software updates to ASUS laptops and desktops. The attackers added a backdoor to the utility and then distributed it to users thr
Publish At:2019-09-19 18:20 | Read:273 | Comments:0 | Tags:Featured Malware reports APT Cyber espionage Data leaks Fina

Threat landscape for smart buildings

The Kaspersky Industrial Cybersecurity Conference 2019 takes place this week in Sochi, the seventh such conference dedicated to the problems of industrial cybersecurity. Among other things, the conference will address the security of automation systems in buildings — industrial versions of the now common smart home. Typically, such a system consists of vari
Publish At:2019-09-19 18:20 | Read:289 | Comments:0 | Tags:Industrial threats Industrial control systems Internet of Th

IoT Attack Opportunities Seen in the Cybercrime Underground

By Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho In our paper “The Internet of Things in the Cybercrime Underground,” we looked into IoT-related discussions from several cybercrime underground communities. We found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. Unsurprisingly, ex
Publish At:2019-09-19 14:50 | Read:204 | Comments:0 | Tags:Internet of Things cybercrime underground iiot industrial in

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

By Jonathan Andersson and Federico Maggi Early this year, we published a security analysis of industrial radio remote controllers. In that research, we examined different vulnerabilities in the implementation of radio frequency (RF) communication and the possible impact of an attack on these weaknesses. We believe that RF security research is of great import
Publish At:2019-09-19 14:50 | Read:127 | Comments:0 | Tags:Internet of Things iiot IOT radio frequency RFID Software De

When PSD2 Opens More Doors: The Risks of Open Banking

By Feike Hacquebord, Robert McArdle, Fernando Mercês, and David Sancho As more industries adapt to cater to the increasingly mobile market, the financial industry is the latest to experience a shake-up. The Revised Payment Service Directive (PSD2) – also known as Open Banking – is a new set of rules for the European Union (EU) that’s expected to affect
Publish At:2019-09-19 14:50 | Read:334 | Comments:0 | Tags:Bad Sites Internet of Things Malware Mobile Ransomware Vulne

KRACK Detector is a tool to detect and prevent KRACK attacks in your network

How to discover if your network is vulnerable to KRACK attack? KRACK Detector is a script that can detect attacks against client devices on your network. Last week I published a post warning of many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). The Belgian research
Publish At:2017-11-06 10:45 | Read:4866 | Comments:0 | Tags:Breaking News Hacking Internet of Things KRACK attack KRACK

DDoS attacks in Q3 2017

News Overview In the third quarter of 2017, the trends of the preceding quarters continued to develop further. The number of DDoS attacks in China, the United States, South Korea and Russia increased, which were reflected in the statistics we gathered for botnets. A sharp surge in the number (more than 450 daily) and power (up to 15.8 million packets per sec
Publish At:2017-11-06 09:20 | Read:3201 | Comments:0 | Tags:DDoS reports Featured Botnets DDoS-attacks Internet of Thing

Watch out! European Consumer Organisation warns of some kid GPS smartwatches have security flaws

Some kid smartwatches available for sale in Europe pose security and privacy risks, including potentially allowing hackers to take control over them. The European Consumer Organisation (BEUC) warns that most children’s GPS-tracking smartwatches represent a threat for them. Many devices are affected by security vulnerabilities that could be exploited by
Publish At:2017-10-22 06:05 | Read:4263 | Comments:0 | Tags:Breaking News Digital ID Hacking Internet of Things IoT kids

A new Mirai-Like IoT Botnet is growing in a new mysterious campaign

Malware researchers at Check Point have uncovered a new massive IoT botnet that presented many similarities with the dreaded Mirai. The new thing bot emerged at the end of September and appears much more sophisticated, according to the experts the malware already infected more than one million organizations worldwide. The malicious code tries to exploit many
Publish At:2017-10-22 06:05 | Read:2753 | Comments:0 | Tags:Breaking News Hacking Internet of Things Malware Cybercrime

Dnsmasq: A Reality Check and Remediation Practices

Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on
Publish At:2017-10-21 18:05 | Read:4098 | Comments:0 | Tags:Internet of Things Vulnerabilities Dnsmasq routers

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud