HackDig : Dig high-quality web security articles for hacker

Russia’s FSB wanted its own IoT botnet

byDanny BradburyIf you thought the Mirai botnet was bad, what about a version under the control of Russia’s military that it could point like an electronic cannon at people it didn’t like? That’s the prospect we could face after the reported emergence of secret Russian project documents online last week.The documents, which come from hackin
Publish At:2020-03-24 09:55 | Read:263 | Comments:0 | Tags:Botnet Denial of Service Government security IoT Machine Lea

Botnet operators target multiple zero-day flaws in LILIN DVRs

Experts observed multiple botnets exploiting zero-day vulnerabilities in DVRs for surveillance systems manufactured by Taiwan-based LILIN. Botnet operators are exploiting several zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN- According to the Chinese security firm 
Publish At:2020-03-23 05:05 | Read:284 | Comments:0 | Tags:Breaking News Cyber Crime Internet of Things Malware IoT LIL

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as
Publish At:2020-03-11 08:47 | Read:228 | Comments:0 | Tags:Retail IoT Access Management Connected Devices Customer Expe

In 2020, IoT Security Must Be Part of Your Threat Management Strategy

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or wireless connections and expanding the enterprise attack surface. In fact, enterprises nowadays likely have more internet of things (IoT) devices on their networks than traditiona
Publish At:2020-03-10 10:01 | Read:336 | Comments:0 | Tags:CISO IoT Connected Devices Internet of Things (IoT) IoT Secu

Measuring Security Risk in a Medical IoT World

The medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks. Between those operational technologies and the devices the U.S. Food and Drug Administration (FDA) has already deemed critical, th
Publish At:2020-03-04 09:51 | Read:240 | Comments:0 | Tags:Endpoint Healthcare Risk Management Security Services IoT Co

Ironpie robot vacuum can suck up your privacy

byLisa VaasAccording to its maker, Trifo, the Ironpie home surveillance robot vacuum isn’t just your dust bunnies’ worst nightmare. It also chases intruders away with its “advanced vision system”.I am always alert and never sleep on the job.Funny thing about that always alert thing. It’s true, the artificial intelligence (AI) -enhanced inte
Publish At:2020-03-02 09:21 | Read:211 | Comments:0 | Tags:2-factor Authentication IoT Privacy Security threats Vulnera

Ring makes 2FA mandatory to keep hackers out of your doorbell account

byLisa VaasLeery of losing microseconds of your life by using two-factor authentication (2FA) to keep your stuff safe from hackers?Alas for you, but hurray for security. Bit by bit, the Internet of Things (IoT) is getting a wee bit more secure: last week, Google announced that it would soon begin forcing users of its Nest gadgets to use 2FA, and this week, s
Publish At:2020-02-20 07:51 | Read:279 | Comments:0 | Tags:2-factor Authentication Amazon IoT Security threats 2FA cred

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Go grab a copy of the Gerbers and 3D-printed Case STL files at https://github.com/whid-injector/Focaccia-Board and print through your favorite FAB. Prologue Even before the appearance of the word (I)IoT, I was breaking hardware devices, as many of you, with a multitude of debuggers (i.e. stlink, jlink, RS23–2-2USB, etc.). It was always a PITA
Publish At:2020-02-18 10:09 | Read:254 | Comments:0 | Tags:Hacking Internet of Things Focaccia Board hacking news IoT i

SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors

Security experts have discovered multiple flaws, dubbed SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. A group of researchers has discovered multiple vulnerabilities, tracked as SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. The group was co
Publish At:2020-02-15 17:31 | Read:221 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth informati

Will Weak Passwords Doom the Internet of Things (IoT)?

Weak passwords can hurt any organization’s security efforts and make any device easily hackable, but could they also be the greatest point of failure for internet of things (IoT) security? Weak passwords certainly put companies deploying IoT devices at greater risk of falling victim to a cyberattack. We have already begun to see attacks targeting IoT d
Publish At:2020-02-15 17:18 | Read:261 | Comments:0 | Tags:Endpoint Risk Management IoT Authentication Connected Device

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:492 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

Access data of 515,000 servers and IoT devices leaked online: Remote control via Telnet possible

Cybercriminals have published the access data and IP addresses of over 515,000 servers, routers and IoT devices on a hacker forum. This data can be used to control vulnerable devices using the remote maintenance service Telnet. This could allow attackers to connect to the devices, install malware and use it for their own benefit, for example to set up a botn
Publish At:2020-01-28 09:15 | Read:429 | Comments:0 | Tags:Business News data breach Germany IoT

DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet

by Aliakbar Zahravi  We recently found notable malware activity affecting devices running Linux, a platform that has battled numerous issues just this year. Further analysis of retrieved malware samples revealed that these actions were connected to a botnet called Momentum (named for the image found in its communication channel). We found new details on the
Publish At:2019-12-16 14:35 | Read:748 | Comments:0 | Tags:Botnets Exploits Internet of Things botnet IOT Momentum rout

The little-known ways mobile device sensors can be exploited by cybercriminals

The bevy of mobile device sensors in modern smartphones and tablets make them more akin to pocket-sized laboratories and media studios than mere communication devices. Cameras, microphones, accelerometers, and gyroscopes give incredible flexibility to app developers and utility to mobile device users. But the variety of inputs also give clever hackers new me
Publish At:2019-12-11 16:50 | Read:977 | Comments:0 | Tags:IoT accelerometer Android camera Google gyroscope Internet o

Parents say creep hacked their baby monitor to tell toddler they ‘love’ her

byLisa VaasAnother mouthbreather with nothing better to do than hack a baby monitor and broadcast their “love” for a 3-year-old has apparently struck again.This time, it happened to a family in Seattle.According to local broadcaster King 5, a couple who asked to be identified only as Jo and John said that their daughter, Jaden, was spied on by a stranger who
Publish At:2019-11-26 12:35 | Read:548 | Comments:0 | Tags:IoT Privacy Security threats baby monitor baby monitors FRED


Share high-quality web security related articles with you:)


Tag Cloud