HackDig : Dig high-quality web security articles for hackers

Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things. For years, Internet capabilities have crept into modern consumer products, providing sometimes convenient, sometimes extra
Publish At:2020-07-07 14:23 | Read:172 | Comments:0 | Tags:Podcast beacons bluetooth Chromebook chromebook antivirus In

Netgear is releasing fixes for ten issues affecting 79 products

Netgear is addressing ten vulnerabilities affecting nearly 80 of its products, including issues discovered at the Pwn2Own hacking competition. Netgear is releasing security patches to address ten vulnerabilities affecting nearly 80 of its products. Some of the vulnerabilities were discovered during the Pwn2Own Tokyo 2019 hacking contest and reported throu
Publish At:2020-07-02 08:29 | Read:75 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

Satori IoT botnet author sentenced to 13 months in prison

byLisa VaasThe coder who created the massive Satori botnet of enslaved devices and a handful of other botnets will be spending 13 months behind bars, the US Attorney’s Office of Alaska announced on Friday.Kenneth Currin Schuchman, 22, from Vancouver, Wash., spent years developing distributed denial-of-service (DDoS) botnets. In September 2019, he pleaded gui
Publish At:2020-06-29 07:48 | Read:123 | Comments:0 | Tags:Denial of Service Law & order Security threats DDoS Fbot/Tsu

New XORDDoS, Kaiji DDoS botnet variants target Docker servers

Operators behind XORDDoS and Kaiji DDoS botnets recently started targeting Docker servers exposed online, Trend Micro warns. Trend Micro researchers reported that operators behind XORDDoS and Kaiji DDoS botnets recently started targeting Docker servers exposed online. XORDDoS, also known as XOR.DDoS, first appeared in the threat landscape in 2014 it is
Publish At:2020-06-24 03:35 | Read:190 | Comments:0 | Tags:Breaking News Hacking Malware botnet Docker hacking news inf

A daily average of 80,000 printers exposed online via IPP

Experts found tens of thousands of printers that are exposed online that are leaking device names, organization names, WiFi SSIDs, and other info. It’s not a mystery, a printer left exposed online without proper security could open the doors to hackers, now researchers from Shadowserver Foundation have discovered tens of thousands of printers that a
Publish At:2020-06-23 12:09 | Read:80 | Comments:0 | Tags:Breaking News Hacking Internet of Things IoT IPP

End of line: supporting IoT in the home

Trouble is potentially brewing in Internet of Things (IoT) land, even if the consequences may still be a little way off. System updates and issues surrounding expiring certificates will pose problems for manufacturers and headaches for consumers. System updates for fun and profit One of the first mainstream collisions of putting updates out to pasture
Publish At:2020-06-17 15:39 | Read:217 | Comments:0 | Tags:Cybercrime Privacy advertisement app appliance fridge guaran

Ripple20 flaws in Treck TCP/IP stack potentially expose hundreds of millions of devices to hack

Serious security vulnerabilities in the Treck TCP/IP stack dubbed Ripple20 expose millions of IoT devices worldwide to cyber attacks, researchers warn. Hundreds of millions of devices worldwide could be vulnerable to remote attacks due to security vulnerabilities in the Treck TCP/IP stack dubbed Ripple20. Treck TCP/IP is a high-performance TCP/IP proto
Publish At:2020-06-16 17:25 | Read:170 | Comments:0 | Tags:Breaking News Hacking Internet of Things Security hacking ne

Protecting Fleet Data from Security Threats

Big data is revolutionizing fleet management — specifically in the form of telematics.From engine diagnostics that track fuel efficiency and mileage to sensors that detect aggressive driving behavior and interior vehicle activity, this information is so valuable that we’re quickly approaching the point where connected technology will come standard in every v
Publish At:2020-05-26 23:35 | Read:186 | Comments:0 | Tags:Internet of Things IT Security and Data Protection Big Data

Law enforcement and Microsoft join forces to dismantle botnet using LED Light Control Console

Cybercriminals have abused LED light control console to launch malicious attacks, Microsoft’s security experts warn. Microsoft researchers shared details of a new incident discovered in Taiwan, where crooks abused LED light control consoles to launch malicious attacks. Threat actors used the consoles to deliver malware and ransomware through an IoT bot
Publish At:2020-04-20 12:08 | Read:528 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

As if the world couldn’t get any weirder, this AI toilet scans your anus to identify you

byLisa VaasYes, your continuous health monitoring Internet of Things (IoT) wrist wrapper well may track your sleep quality and how many calories you burn, but answer me this: does it stick artificial intelligence (AI) sensors up in your business to capture your urine flow and the Sistine Chapel-esque glory of the unique-as-a-fingerprint biometric that is you
Publish At:2020-04-08 08:21 | Read:563 | Comments:0 | Tags:Privacy analprint biometrics cloud storage continuous health

Cybersecurity labeling scheme introduced to help users choose safe IoT devices

The Internet of Things (IoT) is a term used to describe a wide variety of devices that are connected to the Internet to improve user experience. For example, a doorbell becomes part of the IoT when it connects to the Internet and allows users to see visitors outside their door. But the way in which some of these IoT devices connect invites serious securit
Publish At:2020-04-07 14:49 | Read:645 | Comments:0 | Tags:IoT apac cls cybersecurity labeling scheme passwords routers

Russia’s FSB wanted its own IoT botnet

byDanny BradburyIf you thought the Mirai botnet was bad, what about a version under the control of Russia’s military that it could point like an electronic cannon at people it didn’t like? That’s the prospect we could face after the reported emergence of secret Russian project documents online last week.The documents, which come from hackin
Publish At:2020-03-24 09:55 | Read:535 | Comments:0 | Tags:Botnet Denial of Service Government security IoT Machine Lea

Botnet operators target multiple zero-day flaws in LILIN DVRs

Experts observed multiple botnets exploiting zero-day vulnerabilities in DVRs for surveillance systems manufactured by Taiwan-based LILIN. Botnet operators are exploiting several zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN- According to the Chinese security firm 
Publish At:2020-03-23 05:05 | Read:775 | Comments:0 | Tags:Breaking News Cyber Crime Internet of Things Malware IoT LIL

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as
Publish At:2020-03-11 08:47 | Read:440 | Comments:0 | Tags:Retail IoT Access Management Connected Devices Customer Expe

In 2020, IoT Security Must Be Part of Your Threat Management Strategy

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or wireless connections and expanding the enterprise attack surface. In fact, enterprises nowadays likely have more internet of things (IoT) devices on their networks than traditiona
Publish At:2020-03-10 10:01 | Read:688 | Comments:0 | Tags:CISO IoT Connected Devices Internet of Things (IoT) IoT Secu


Share high-quality web security related articles with you:)