HackDig : Dig high-quality web security articles for hacker

Securing Autonomous Vehicles Paves the Way for Smart Cities

As homes, workplaces, and cities digitally transform during our Fourth Industrial Revolution, many of those charged with securing this digital future can find it difficult to “level up” from the endpoints and focus on defining and solving the larger problem sets. It is easy to get bogged down in the myriad of smart and smart-enough devices that constitute “I
Publish At:2019-11-14 22:15 | Read:67 | Comments:0 | Tags:INDUSTRY INSIGHTS IoT Security

Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own

Pwn2Own Tokyo 2019 has come to an end and on the second day of the hacking contest bug bounty hunters have earned a total of $120,000 for demonstrating exploits against Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers.Of the seven hacking attempts scheduled for day two, four were a complete success. Amat Cama and Richard Zhu of the Fluoroa
Publish At:2019-11-11 22:15 | Read:96 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

The Threat to SoHo IoT Devices is Growing Rapidly

A network of 50 honeypots deployed around the world has been catching and monitoring attacks against IoT devices. Such detected attacks have increased almost nine-fold between H1 2018 and H1 2019, from 12 million to 105 million. During the same period, the number of unique attacking IP addresses increased from 69,000 to 276,000.Many of the attacks are direct
Publish At:2019-10-25 12:00 | Read:291 | Comments:0 | Tags:NEWS & INDUSTRY IoT Security

Micron Launches Silicon-Based Security-as-a-Service Platform

New Hardware-based Security Solution Helps Secure IoT Devices at the Silicon LevelThe IoT can arguably be defined in two categories: low capacity small embedded things (like sensors within an industrial control environment), and more powerful edge devices (like routers, smart TVs, in-car entertainment systems and so on). According to Gartner, there will be 3
Publish At:2019-10-24 22:15 | Read:160 | Comments:0 | Tags:NEWS & INDUSTRY IoT Security

Outdated OSs Still Present in Many Industrial Organizations: Report

ATLANTA — SECURITYWEEK 2019 ICS CYBER SECURITY CONFERENCE — Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations, according to a new report from industrial cybersecurity firm CyberX.The company’s 2020 Global IoT/ICS Risk Report is based on data passively collected by CyberX from over
Publish At:2019-10-22 10:15 | Read:254 | Comments:0 | Tags:Network Security NEWS & INDUSTRY SCADA / ICS Risk Manage

New Blockchain Solution for IIoT Aims to Solve Scaling Problem

Blockchain, or distributed ledger, is sometimes described as a 'solution in search of a problem'. There are many valid applications outside of pure cybersecurity -- for example, reducing transaction costs in complex legal situations like house purchase, or tracking the location of physical goods in distribution or supply chains -- but improving cybersecurity
Publish At:2019-10-11 12:00 | Read:332 | Comments:0 | Tags:NEWS & INDUSTRY IoT Security

How Blockchain Will Solve Some of IoT's Biggest Security Problems

Blockchain Can Protect Systems and Devices While Supporting IoT Devices that Have Few Security DefensesWhile blockchain has its place in the world of cryptocurrency, the growing list of industries considering blockchain initiatives is growing fast including healthcare, telecommunications, energy and even manufacturing.The reason? Data integrity.Blockchain is
Publish At:2019-10-09 12:00 | Read:293 | Comments:0 | Tags:INDUSTRY INSIGHTS IoT Security

Device & App Safety Guide for Families

While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time to come together and turn up the volume on the digital safety and security conversation worldwide. To kick off that effort, here’s a comprehensive Device and App Safety Guide to give your family quick ways to boost safety and secu
Publish At:2019-10-06 11:20 | Read:245 | Comments:0 | Tags:Family Safety #BeCyberSmart #NCSAM #CyberAware anonymous app

Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure

A researcher has used a free tool that he created and open source intelligence (OSINT) to demonstrate how easy it is for adversaries to gather intelligence on critical infrastructure in the United States.The researcher, known online as Wojciech, used his Kamerka tool to find industrial control systems (ICS) in the United States, map them to geographical loca
Publish At:2019-10-04 00:00 | Read:335 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Identity & Access Risk M

Urgent/11 Flaws Impact More RTOS Used by Medical, Industrial Devices

IoT security firm Armis has confirmed that the recently disclosed vulnerabilities tracked as Urgent/11 affect several real time operating systems (RTOS) other than VxWorks.Armis revealed in late July that Wind River’s VxWorks operating system, which is used by millions of devices, is affected by 11 vulnerabilities, including critical flaws that can be exploi
Publish At:2019-10-02 12:00 | Read:281 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Vulnerabilities IoT Security

Tridium Niagara Affected by BlackBerry QNX Vulnerabilities

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) informed organizations last week that Tridium’s Niagara product is affected by two vulnerabilities in BlackBerry’s QNX operating system for embedded devices.Niagara is a popular framework designed for connecting and controlling a wide range of Internet of Thing
Publish At:2019-09-30 12:00 | Read:184 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Vulnerabilities IoT Security

GAO Says Electric Grid Cybersecurity Risks Only Partially Assessed

A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks.The report includes the findings of a recently conducted review of the cybersecurity of the national electric grid, which includes “the commercial electric power generation, transm
Publish At:2019-09-27 12:00 | Read:347 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Virus & Threats Complian

Honeywell Launches New Industrial Cybersecurity Platform

Honeywell on Wednesday announced the launch of a new industrial cybersecurity platform designed to help organizations protect their operational technology (OT) and industrial internet of things (IIoT) assets from cyber threats.The new Honeywell Forge Cybersecurity Platform, part of the company’s Forge for Cybersecurity offering, provides visibility into vuln
Publish At:2019-09-26 00:00 | Read:337 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Risk Management Management &

Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 Devices

D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited remotely to take complete control of a device and access the files stored on it.Researchers at Vietnam-based CyStack Security discovered the vulnerability and reported it to D-Link in mid-August. An advisory was released by the ven
Publish At:2019-09-23 12:00 | Read:206 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Vulnerabilities IoT Sec

Arm Exploitation Series #1 — Introduction to the ARM Architecture

With the increasing growth in Internet-Of-Things (IoT) devices, it is an absolute necessity to scrutinize the security of these devices too, especially when they’re going to be right in our homes. What better way to start, than at the very instruction set architecture (ISA) that’s most commonly found on these devices — ARM. ARM, or what wa
Publish At:2019-09-19 14:11 | Read:159 | Comments:0 | Tags:IoT Security Knowledge-base ARM Exploitation exploit


Share high-quality web security related articles with you:)


Tag Cloud