HackDig : Dig high-quality web security articles for hacker

DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet

by Aliakbar Zahravi  We recently found notable malware activity affecting devices running Linux, a platform that has battled numerous issues just this year. Further analysis of retrieved malware samples revealed that these actions were connected to a botnet called Momentum (named for the image found in its communication channel). We found new details on the
Publish At:2019-12-16 14:35 | Read:415 | Comments:0 | Tags:Botnets Exploits Internet of Things botnet IOT Momentum rout

The little-known ways mobile device sensors can be exploited by cybercriminals

The bevy of mobile device sensors in modern smartphones and tablets make them more akin to pocket-sized laboratories and media studios than mere communication devices. Cameras, microphones, accelerometers, and gyroscopes give incredible flexibility to app developers and utility to mobile device users. But the variety of inputs also give clever hackers new me
Publish At:2019-12-11 16:50 | Read:424 | Comments:0 | Tags:IoT accelerometer Android camera Google gyroscope Internet o

Parents say creep hacked their baby monitor to tell toddler they ‘love’ her

byLisa VaasAnother mouthbreather with nothing better to do than hack a baby monitor and broadcast their “love” for a 3-year-old has apparently struck again.This time, it happened to a family in Seattle.According to local broadcaster King 5, a couple who asked to be identified only as Jo and John said that their daughter, Jaden, was spied on by a stranger who
Publish At:2019-11-26 12:35 | Read:293 | Comments:0 | Tags:IoT Privacy Security threats baby monitor baby monitors FRED

A week in security (November 18 – 24)

Last week on Malwarebytes Labs, we looked at stalkerware’s legal enforcement problem, announced our cooperation with other security vendors and advocacy groups to launch Coalition Against Stalkerware, published our fall 2019 review of exploit kits, looked at how Deepfake on LinkedIn makes for malign interference campaigns, rounded up our knowledge about the
Publish At:2019-11-25 09:50 | Read:305 | Comments:0 | Tags:A week in security Coalition Against Stalkerware data leaks

IoT bills and guidelines: a global response

You may not have noticed, but Internet of Things (IoT) rules and regulations are coming whether manufacturers want them or not. From experience, drafting up laws which are (hopefully) sensible and have some relevance to problems raised by current technology is a time-consuming, frustrating process. However, it’s not that long since we saw IoT devices go main
Publish At:2019-11-22 16:50 | Read:410 | Comments:0 | Tags:IoT Privacy Australia California internet Internet of Things

Google chief warns visitors about smart speakers in his home

byLisa VaasApparently caught off-guard by a question from the BBC, Google hardware chief Rick Osterloh made up a privacy etiquette rule on the spot last week when he said that yes, homeowners should tell guests that they’ve got smart speakers running in their homes.At any rate, that’s what he does, he said.Here’s his reported response after
Publish At:2019-10-22 05:45 | Read:490 | Comments:0 | Tags:Amazon Google IoT Privacy Alexa Amazon Echo eavesdropping Go

OpenDreamBox: the vulnerability that affects 32% of the world’s companies

The Internet of things (IoT) has revolutionized the business world. It has helped to streamline industrial processes, reduce costs, and has even created new business models. But, as is often the case, all of these advantages go hand in hand with a series of disadvantages. The most important of these disadvantages is the significant increase in the attack sur
Publish At:2019-10-09 10:35 | Read:530 | Comments:0 | Tags:News Security business IoT vulnerabilities Vulnerability

McAfee Receives the 2019 Security Excellence Award From IoT Evolution

If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether it be voice assistants, smart TVs, thermostats, or gaming systems, IoT devices help make our lives easier. But with greater connectivity also comes greater exposure to online threats. However, that doesn’t mean users shou
Publish At:2019-09-30 23:20 | Read:647 | Comments:0 | Tags:Consumer cybersafety cybersecurity Internet of Things IoT

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:3321 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks

iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been exploiting multiple iPhone vulnerabilities for the last two years. How? Simply by getting users to visit a website. How exactly does this exploitation campaign work? According to WIRED, researchers revealed
Publish At:2019-09-19 23:20 | Read:534 | Comments:0 | Tags:Consumer Threat Notices Apple cybersecurity IoT malware mobi

IoT Attack Opportunities Seen in the Cybercrime Underground

By Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho In our paper “The Internet of Things in the Cybercrime Underground,” we looked into IoT-related discussions from several cybercrime underground communities. We found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. Unsurprisingly, ex
Publish At:2019-09-19 14:50 | Read:469 | Comments:0 | Tags:Internet of Things cybercrime underground iiot industrial in

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

By Jonathan Andersson and Federico Maggi Early this year, we published a security analysis of industrial radio remote controllers. In that research, we examined different vulnerabilities in the implementation of radio frequency (RF) communication and the possible impact of an attack on these weaknesses. We believe that RF security research is of great import
Publish At:2019-09-19 14:50 | Read:743 | Comments:0 | Tags:Internet of Things iiot IOT radio frequency RFID Software De

Watch out! European Consumer Organisation warns of some kid GPS smartwatches have security flaws

Some kid smartwatches available for sale in Europe pose security and privacy risks, including potentially allowing hackers to take control over them. The European Consumer Organisation (BEUC) warns that most children’s GPS-tracking smartwatches represent a threat for them. Many devices are affected by security vulnerabilities that could be exploited by
Publish At:2017-10-22 06:05 | Read:4522 | Comments:0 | Tags:Breaking News Digital ID Hacking Internet of Things IoT kids

A new Mirai-Like IoT Botnet is growing in a new mysterious campaign

Malware researchers at Check Point have uncovered a new massive IoT botnet that presented many similarities with the dreaded Mirai. The new thing bot emerged at the end of September and appears much more sophisticated, according to the experts the malware already infected more than one million organizations worldwide. The malicious code tries to exploit many
Publish At:2017-10-22 06:05 | Read:2973 | Comments:0 | Tags:Breaking News Hacking Internet of Things Malware Cybercrime

A critical vulnerability affects Siemens smart meters

Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters that addresses a critical vulnerability. Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters to fix a critical vulnerability that can be exploited by remote attackers to bypass authentication and perform administrative actions on the device.
Publish At:2017-10-07 06:05 | Read:4911 | Comments:0 | Tags:Breaking News Hacking Internet of Things CVE-2017-9944 IoT S

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud

Keywords