HackDig : Dig high-quality web security articles for hacker

Google chief warns visitors about smart speakers in his home

byLisa VaasApparently caught off-guard by a question from the BBC, Google hardware chief Rick Osterloh made up a privacy etiquette rule on the spot last week when he said that yes, homeowners should tell guests that they’ve got smart speakers running in their homes.At any rate, that’s what he does, he said.Here’s his reported response after
Publish At:2019-10-22 05:45 | Read:146 | Comments:0 | Tags:Amazon Google IoT Privacy Alexa Amazon Echo eavesdropping Go

OpenDreamBox: the vulnerability that affects 32% of the world’s companies

The Internet of things (IoT) has revolutionized the business world. It has helped to streamline industrial processes, reduce costs, and has even created new business models. But, as is often the case, all of these advantages go hand in hand with a series of disadvantages. The most important of these disadvantages is the significant increase in the attack sur
Publish At:2019-10-09 10:35 | Read:345 | Comments:0 | Tags:News Security business IoT vulnerabilities Vulnerability

McAfee Receives the 2019 Security Excellence Award From IoT Evolution

If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether it be voice assistants, smart TVs, thermostats, or gaming systems, IoT devices help make our lives easier. But with greater connectivity also comes greater exposure to online threats. However, that doesn’t mean users shou
Publish At:2019-09-30 23:20 | Read:307 | Comments:0 | Tags:Consumer cybersafety cybersecurity Internet of Things IoT

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:486 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks

iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been exploiting multiple iPhone vulnerabilities for the last two years. How? Simply by getting users to visit a website. How exactly does this exploitation campaign work? According to WIRED, researchers revealed
Publish At:2019-09-19 23:20 | Read:371 | Comments:0 | Tags:Consumer Threat Notices Apple cybersecurity IoT malware mobi

IoT Attack Opportunities Seen in the Cybercrime Underground

By Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho In our paper “The Internet of Things in the Cybercrime Underground,” we looked into IoT-related discussions from several cybercrime underground communities. We found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. Unsurprisingly, ex
Publish At:2019-09-19 14:50 | Read:204 | Comments:0 | Tags:Internet of Things cybercrime underground iiot industrial in

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

By Jonathan Andersson and Federico Maggi Early this year, we published a security analysis of industrial radio remote controllers. In that research, we examined different vulnerabilities in the implementation of radio frequency (RF) communication and the possible impact of an attack on these weaknesses. We believe that RF security research is of great import
Publish At:2019-09-19 14:50 | Read:127 | Comments:0 | Tags:Internet of Things iiot IOT radio frequency RFID Software De

Watch out! European Consumer Organisation warns of some kid GPS smartwatches have security flaws

Some kid smartwatches available for sale in Europe pose security and privacy risks, including potentially allowing hackers to take control over them. The European Consumer Organisation (BEUC) warns that most children’s GPS-tracking smartwatches represent a threat for them. Many devices are affected by security vulnerabilities that could be exploited by
Publish At:2017-10-22 06:05 | Read:4283 | Comments:0 | Tags:Breaking News Digital ID Hacking Internet of Things IoT kids

A new Mirai-Like IoT Botnet is growing in a new mysterious campaign

Malware researchers at Check Point have uncovered a new massive IoT botnet that presented many similarities with the dreaded Mirai. The new thing bot emerged at the end of September and appears much more sophisticated, according to the experts the malware already infected more than one million organizations worldwide. The malicious code tries to exploit many
Publish At:2017-10-22 06:05 | Read:2765 | Comments:0 | Tags:Breaking News Hacking Internet of Things Malware Cybercrime

A critical vulnerability affects Siemens smart meters

Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters that addresses a critical vulnerability. Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters to fix a critical vulnerability that can be exploited by remote attackers to bypass authentication and perform administrative actions on the device.
Publish At:2017-10-07 06:05 | Read:4597 | Comments:0 | Tags:Breaking News Hacking Internet of Things CVE-2017-9944 IoT S

Who Knows Your (Sex) Secrets? Internet of Sex Toys

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug. The recent discovery that internet connected sex toys have major security and privacy flaws should come as no shock but this does raise the issue of how to both satisfy the consumer’s needs while providing maximum protection.  T
Publish At:2017-10-01 20:55 | Read:4403 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth IoT priva

Crooks using Linux.ProxyM IoT botnet to send spam messages

Experts at security firm Doctor Web discovered a new botnet of IoT devices leveraging the Linux.ProxyM, that is used by crooks for mass spam mailings. The most popular thingbot since now is the Mirai, but it isn’t the only one targeting Linux-based internet-of-things (IoT) devices. Researchers with security firm Doctor Web discovered a new botnet of Io
Publish At:2017-09-22 14:45 | Read:2639 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

BlueBorne- the lethal attack to take over your devices

The latest attack Blueborne is taking over by storm , lets read about it in concise, the attack method and the details of this bug. A series of vulnerabilities have been unearthed in the implementation of Bluetooth which allows hackers to take over your computers/ tablets/ smartphones whenever Bluetooth is on. A total of eight critical Bluetooth vulnerabilit
Publish At:2017-09-13 14:25 | Read:2526 | Comments:0 | Tags:News blueborne bluetooth hacking hacking IOT

Hackers can remotely access Smiths Medical Syringe Infusion Pumps to kill patients

The US-CERT is warning of hackers can remotely access Smiths Medical Syringe Infusion Pumps to control them and kill patients. IoT devices continue to enlarge our surface of attack, and in some cases, their lack of security can put our lives in danger. Let’s thinks for example of medical devices that could be hacked by attackers with serious consequenc
Publish At:2017-09-11 20:31 | Read:2896 | Comments:0 | Tags:Breaking News Hacking Security healthcare IoT medical device

WikiLeaks revealed Project Protego, a secret CIA Missile Control System Project for fighters

WikiLeaks has published a new batch of documents that details the Project Protego, a secret CIA Missile Control System Project for fighters Another week, another batch of CIA Vault7 leaks was published by Wikileaks. This time the documents provide details about the Project Protego, a CIA Secret Missile Control System. WikiLeaks published four secret docume
Publish At:2017-09-07 16:17 | Read:2541 | Comments:0 | Tags:Breaking News Data Breach Intelligence CIA cyber espionage H

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud

Keywords