HackDig : Dig high-quality web security articles for hacker

The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard

In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. This hack and those that have come before it have mostly been reliant on specific vulnerabilities
Publish At:2017-08-16 13:40 | Read:223 | Comments:0 | Tags:Exploits Internet of Things intelligent transportation syste

US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch attacks on smart home devices.Trend Micro’s recent report shows more than 1.8 million cyberattacks have been conducted through home network routers in the past six months.
Publish At:2017-08-16 02:40 | Read:148 | Comments:0 | Tags:Don't miss Featured news News Internet of Things survey Tren

Roughly 175,000 Chinese Internet Connected security cameras can be easily hacked

An estimated 175,000 Internet of Things (IoT) connected security cameras manufactured by Shenzhen Neo Electronics are vulnerable to cyber attacks. According to a new report from security provider Bitdefender, roughly 175,000 connected security cameras are vulnerable to cyber attacks. The vulnerable cameras are manufactured by the Chinese company Shenzhen Neo
Publish At:2017-08-02 13:35 | Read:299 | Comments:0 | Tags:Breaking News Hacking Internet of Things botnet Cybercrime I

DDoS attacks in Q2 2017

News Overview The second quarter of 2017 saw DDoS attacks being more and more frequently used as a tool for political struggle. The Qatar crisis was accompanied by an attack on the website of Al Jazeera, the largest news network in the area, Le Monde and Le Figaro websites were targeted in the heat of the presidential election in France, and in Great Britain
Publish At:2017-08-01 17:45 | Read:208 | Comments:0 | Tags:Featured Quarterly Malware Reports Botnets DDoS-attacks Inte

SHELLBIND IoT malware targets NAS devices exploiting SambaCry flaw

The seven-year-old remote code execution vulnerability SambaCry was exploited by the SHELLBIND IoT malware to target NAS devices. A new strain of malware dubbed SHELLBIND exploits the recently patched CVE-2017-7494 Samba vulnerability in attacks against Internet of Things devices. SHELLBIND has infected most network-attached storage (NAS) appliances, it exp
Publish At:2017-07-19 09:10 | Read:278 | Comments:0 | Tags:Cyber Crime Internet of Things Malware CVE-2017-7494 Hacking

Experts found an unpatched flaw in Humax WiFi Router model HG-100R

Experts found a flaw in Humax WiFi Router model HG-100R that could be triggered to fully compromise the devices. A zero-day vulnerability in Humax WiFi Router model HG-100R could be exploited by attackers to compromise the WiFi credentials and obtain the router console administrative password. Trustwave SpiderLabs researchers discovered. The issue was found
Publish At:2017-07-10 04:15 | Read:264 | Comments:0 | Tags:Breaking News Hacking Internet of Things Humax WiFi Router m

Honeypots and the Internet of Things

There were a number of incidents in 2016 that triggered increased interest in the security of so-called IoT or ‘smart’ devices. They included, among others, the record-breaking DDoS attacks against the French hosting provider OVH and the US DNS provider Dyn. These attacks are known to have been launched with the help of a massive botnet made up o
Publish At:2017-06-19 09:35 | Read:279 | Comments:0 | Tags:Featured Research Backdoor Botnets DDoS-attacks honeypot Int

Rapid7 report millions of endpoints exposed via SMB, Telnet Ports

A study conducted by the security firm Rapid7 revealed that millions of devices remain exposed to cyber attacks via  SMB, Telnet, RDP, and other types of improper configurations. Rapid7 published the second report National Exposure Index that provides Internet service providers (ISPs) worldwide information about the global exposure of devices. The researche
Publish At:2017-06-16 09:20 | Read:458 | Comments:0 | Tags:Breaking News Hacking Internet of Things Reports botnet Inte

Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Thousands of IP cameras have been hijacked by the Persirai IoT botnet that targets more than 1,000 IP camera models, but it isn’t the only one. Thousands of IP cameras have been hijacked by the Persirai IoT botnet that targets more than 1,000 IP camera models. Early May, the researchers at Trend Micro discovered a new attack on internet-based IP camer
Publish At:2017-06-10 06:00 | Read:453 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

The Reigning King of IP Camera Botnets and its Challengers

Early this month we discussed a new Internet of Things (IoT) botnet called Persirai (detected by Trend Micro as ELF_PERSIRAI.A), which targets over 1000 Internet Protocol (IP) camera models. Currently, through Shodan and our own research, we see that 64% of tracked IP cameras with custom http servers are infected with Persirai. But, because these cameras are
Publish At:2017-06-08 23:35 | Read:643 | Comments:0 | Tags:Internet of Things DDoS IOT

A new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

Security researchers at Dr. Web discovered two new Linux Malware, one of them mines for cryptocurrency using Raspberry Pi Devices. Malware researchers at the Russian antivirus maker Dr.Web have discovered a new Linux trojan, tracked as Kinux.MulDrop.14, that is infecting Raspberry Pi devices with the purpose of mining cryptocurrency. According to the Russian
Publish At:2017-06-08 17:10 | Read:589 | Comments:0 | Tags:Breaking News Hacking Internet of Things Malware IoT Linux m

F-Secure experts found multiple flaws in popular Chinese Internet-connected cameras

Experts at F-Secure discovered tens of vulnerabilities in tens of thousands of Internet-connected cameras from China-based manufacturer Foscam. Security experts at security firm F-Secure discovered tens of vulnerabilities in tens of thousands of Internet-connected cameras from China-based manufacturer Foscam. The flaws could be exploited by attackers to take
Publish At:2017-06-08 17:10 | Read:402 | Comments:0 | Tags:Breaking News Hacking Internet of Things Foscam Internet-con

Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras

By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that c
Publish At:2017-05-13 14:15 | Read:467 | Comments:0 | Tags:Internet of Things botnet IOT

DDOS attacks in Q1 2017

News Overview Thanks to IoT botnets, DDoS attacks have finally turned from something of a novelty into an everyday occurrence. According to the A10 Networks survey, this year the ‘DDoS of Things’ (DoT) has reached critical mass – in each attack, hundreds of thousands of devices connected to the Internet are being leveraged. The fight against this
Publish At:2017-05-13 11:15 | Read:569 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Botnets DDoS-att

Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem

The increased connectivity of computer and robot systems in the industry 4.0. ecosystem, is, and will be exposing robots to cyber attacks in the future. Indeed, industrial robots—originally conceived to be isolated—have evolved, and are now exposed to corporate networks and the internet. While this provides synergy effects and higher efficiency in production
Publish At:2017-05-03 20:40 | Read:533 | Comments:0 | Tags:Internet of Things ICS industrial robot industrial security

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud