HackDig : Dig high-quality web security articles for hacker

F-Secure experts found multiple flaws in popular Chinese Internet-connected cameras

Experts at F-Secure discovered tens of vulnerabilities in tens of thousands of Internet-connected cameras from China-based manufacturer Foscam. Security experts at security firm F-Secure discovered tens of vulnerabilities in tens of thousands of Internet-connected cameras from China-based manufacturer Foscam. The flaws could be exploited by attackers to take
Publish At:2017-06-08 17:10 | Read:483 | Comments:0 | Tags:Breaking News Hacking Internet of Things Foscam Internet-con

Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras

By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that c
Publish At:2017-05-13 14:15 | Read:590 | Comments:0 | Tags:Internet of Things botnet IOT

DDOS attacks in Q1 2017

News Overview Thanks to IoT botnets, DDoS attacks have finally turned from something of a novelty into an everyday occurrence. According to the A10 Networks survey, this year the ‘DDoS of Things’ (DoT) has reached critical mass – in each attack, hundreds of thousands of devices connected to the Internet are being leveraged. The fight against this
Publish At:2017-05-13 11:15 | Read:708 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports Botnets DDoS-att

Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem

The increased connectivity of computer and robot systems in the industry 4.0. ecosystem, is, and will be exposing robots to cyber attacks in the future. Indeed, industrial robots—originally conceived to be isolated—have evolved, and are now exposed to corporate networks and the internet. While this provides synergy effects and higher efficiency in production
Publish At:2017-05-03 20:40 | Read:624 | Comments:0 | Tags:Internet of Things ICS industrial robot industrial security

Number of WordPress Attacks powered by compromised routers is rapidly dropping

Experts from security firm WordFence reported a rapid reduction of WordPress attacks originating from hundreds of ISPs worldwide. Experts at the security firm Wordfence a few weeks ago reported that tens of thousands of flawed routers from dozens of ISPs worldwide were recruited in a botnet used to power several types of attacks against WordPress websites. H
Publish At:2017-05-03 14:15 | Read:484 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things botnet

The Hajime Botnet continues to grow and implements a new attack technique

The mysterious Hajime Botnet continues to grow and reached 300,000 IoT Devices, the author also implemented a new attack method. Recently experts from Symantec spotted a new IoT botnet dubbed Hajime that is spreading quickly in the last months, mostly in Brazil and Iran. The Hajime malware was first spotted in October 2016, it implements the same mechanism u
Publish At:2017-04-28 15:06 | Read:492 | Comments:0 | Tags:Breaking News Internet of Things Malware Hacking Hajime IoT

StringBleed SNMP Authentication Bypass affects numerous devices online

Security researchers discovered an SNMP flaw dubbed StringBleed that affects several models of Internet-connected devices. Simple Network Management Protocol (SNMP) authentication bypass affects several IoT devices, hackers could exploit the issue by simply sending random values in specific requests. The problem, dubbed StringBleed and tracked as CVE 2017-51
Publish At:2017-04-28 15:05 | Read:555 | Comments:0 | Tags:Breaking News Hacking Internet of Things bypass authenticati

Hajime, the mysterious evolving botnet

Introduction Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 in a public report by RapidityNetworks. One month later we saw the first samples being uploaded from Spain to VT. This worm builds a huge P2P botnet (almost 300,000 devices at the time of publishing this blogpost), but its real purpose
Publish At:2017-04-25 12:00 | Read:1192 | Comments:0 | Tags:Blog Featured Research Botnets honeypot Internet of Things M

WikiLeaks published the user guide for the CIA Weeping Angel, the Samsung Smart TV Hacking Tool

WikiLeaks published the user guide related to the hacking tool allegedly used by the CIA, code-named Weeping Angel, to hack Samsung Smart TV. WikiLeaks has published a new document included in the Vault7 archive containing technical details about another hacking tool allegedly used by the U.S. Central Intelligence Agency (CIA). This time, the organization ha
Publish At:2017-04-21 17:25 | Read:504 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence Internet of

Symantec is monitoring the Hajime IoT malware, is it the work of vigilante hacker?

Symantec observed the Hajime IoT malware leaving a message on the devices it infects, is it the work of a cyber vigilante? The Mirai botnet is the most popular thingbot, it is targeting poorly configured and flawed ‘Internet of Things’ devices since August 2016, when the threat was first discovered by the researcher MalwareMustDie. Many other bots 
Publish At:2017-04-20 04:35 | Read:544 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

Imperva observed a new variant of the Mirai botnet unleashes 54-Hour DDoS attack

According to security experts at Imperva, a newly discovered variant of the Mirai botnet was used to power a 54-hour DDoS attack. According to security experts at Imperva, a newly discovered variant of the dreaded Mirai botnet was used to power a 54-hour distributed denial of service (DDoS) attack. The new variant of the Mirai botnet was observed targeting a
Publish At:2017-03-30 16:00 | Read:589 | Comments:0 | Tags:Breaking News Cyber Crime Internet of Things Malware Cybercr

The Mistakes of Smart Medicine

As numerous studies have shown, smart houses, smart cars, and smart cities are undeniably beneficial to people in everyday life, but quite often can become a threat to their safety. It is not only a matter of personal data leakage. Just imagine that, for example, a smart refrigerator, affected by a third party at one point or another, would begin identifying
Publish At:2017-03-30 14:35 | Read:628 | Comments:0 | Tags:Analysis Featured Publications infrastructure Internet of Th

Miele Professional PG 8528 washer-disinfector affected by a Web Server Directory Traversal

An Internet-Connected Medical Washer-Disinfector, the Miele’s model Professional PG 8528, is affected by a Web Server Directory Traversal. While the number of IoT devices continue to exponentially increase, the level of security of these smart objects is often not adequate end exposes users at risk of cyber attacks. The news of the say is a security v
Publish At:2017-03-27 14:05 | Read:545 | Comments:0 | Tags:Breaking News Hacking Internet of Things

ELF_IMEIJ, a new Linux malware is spreading in the wild

Security experts from Trend Micro discovered a new family of Linux malware, tracked as ELF_IMEIJ, targeting AVTech surveillance devices. Security experts from Trend Micro discovered a new family of Linux malware that is targeting products from surveillance technology company AVTech exploiting a CGI vulnerability that was disclosed in 2016. According to Trend
Publish At:2017-03-12 05:15 | Read:727 | Comments:0 | Tags:Breaking News Internet of Things Malware ELF_IMEIJ.A IoT Lin

New Linux Malware Exploits CGI Vulnerability

by Jeanne Jocson and Jennifer Gumban Linux has long been the preferred operating system for enterprise platforms and Internet of Things (IoT) manufacturers. Linux-based devices are continually being deployed in smart systems across many different industries, with IoT gateways facilitating connected solutions and services central to different businesses. In c
Publish At:2017-03-10 19:40 | Read:944 | Comments:0 | Tags:Exploits Internet of Things Vulnerabilities Linux malware Vu

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud