HackDig : Dig high-quality web security articles for hacker

Dnsmasq: A Reality Check and Remediation Practices

Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on
Publish At:2017-10-21 18:05 | Read:1184 | Comments:0 | Tags:Internet of Things Vulnerabilities Dnsmasq routers

Netgear addressed dozens of vulnerabilities in Routers, Switches and NAS

Netgear has published more than 50 security advisories in the past 2 weeks related to the availability of patches for flaws in its products. Netgear has published more than 50 security advisories in the past two weeks related to the availability of patches for vulnerabilities affecting its products, including routers, switches, network-attached storage (NAS)
Publish At:2017-10-02 15:20 | Read:841 | Comments:0 | Tags:Breaking News Hacking NAS Netgear routers Switches

Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem

The increased connectivity of computer and robot systems in the industry 4.0. ecosystem, is, and will be exposing robots to cyber attacks in the future. Indeed, industrial robots—originally conceived to be isolated—have evolved, and are now exposed to corporate networks and the internet. While this provides synergy effects and higher efficiency in production
Publish At:2017-05-03 20:40 | Read:1738 | Comments:0 | Tags:Internet of Things ICS industrial robot industrial security

Routers Under Attack: Current Security Flaws and How to Fix Them

How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed? Last year, user Y, who is based in Brazil, lost R$600 (US$191.02, as of January 30, 2017) as a side effect of information theft. Upon discovering this, Y immediately called an IT technician to find the root c
Publish At:2017-01-31 21:10 | Read:1660 | Comments:0 | Tags:Internet of Things home routers routers

Thai TrueOnline ZyXEL and Billion routers still unpatched since July

The security researcher Pedro Ribeiro disclosed several vulnerabilities in the ZyXEL customized routers that could be easily exploited by hackers. Details on serious vulnerabilities in a number of routers freely distributed by the TrueOnline Thai ISP were published on Monday after private disclosures made to the vendors in July went unanswered. The security
Publish At:2017-01-17 19:10 | Read:1729 | Comments:0 | Tags:Breaking News Hacking Billion routers IoT routers ZYXEL ZyXE

ZyXEL Customized Routers plagues by multiple vulnerabilities

According to the firm SecuriTeam, several ZyXEL customized routers are affected by many vulnerabilities that could be easily exploited by hackers. According to the firm SecuriTeam, multiple ZyXEL customized routers are affected by many vulnerabilities. The devices are distributed by the Thai IPS TrueOnline. The ZyXEL customized routers are offered for free t
Publish At:2016-12-28 12:45 | Read:1850 | Comments:0 | Tags:Breaking News Hacking Internet of Things IoT Pierluigi Pagan

Cisco Small Business Routers plagued by several critical flaws

Security experts have uncovered several critical flaws in Cisco Small Business Routers that in some cases could result in the take over of the device Security experts Adam Zielinski and Harri Kuosmanen reported to CISCO several critical and high severity flaws in the CISCO Small Business Routers. According to CISCO, the CVE-2015-6397 flaw affects RV series r
Publish At:2016-08-05 03:25 | Read:1047 | Comments:0 | Tags:Breaking News Hacking Cisco Small Business Routers network d

TP-Link forgets to register domain name, leaves config pages open to hijack

In common with many other vendors, TP-Link, one of the world's biggest sellers of Wi-Fi access points and home routers, has a domain name that owners of the hardware can use to quickly get to their router's configuration page. Unlike most other vendors, however, it appears that TP-Link has failed to renew its registration for the domain, leaving it available
Publish At:2016-07-07 00:40 | Read:1899 | Comments:0 | Tags:Risk Assessment DNS routers security

A dangerous Worm is infected outdated Ubiquiti Devices worldwide

A worm is infecting routers and other wireless devices across the world made by the Ubiquiti Networks company. An insidious worm is infecting routers and other wireless devices made by Ubiquiti Networks across the world. ISPs worldwide reported the malware-based attacks, the threat can take complete control of the wireless networking equipment by exploiting 
Publish At:2016-05-22 12:05 | Read:1192 | Comments:0 | Tags:Breaking News Hacking Cybersecurity IoT Pierluigi Paganini r

The Linux Remaiten malware is building a Botnet of IoT devices

Experts from the ESET firm have spotted a new threat in the wild dubbed Remaiten that targets embedded systems to recruit them in a botnet. ESET is  actively monitoring malicious codes that target IoT systems such as routers, gateways and wireless access points, rather than computers or smartphones. Security researchers from ESET have discovered a new threat
Publish At:2016-04-01 03:35 | Read:1092 | Comments:0 | Tags:Breaking News Cyber Crime Internet of Things Malware Cybercr

0-day critical flaws in mobile modems allow hackers to take over your PC

The Russian security tester Timur Yunusov has discovered critical flaw affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The Russian security tester Timur Yunusov has discovered critical vulnerabilities affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The security holes could be exploited
Publish At:2016-03-12 11:25 | Read:2235 | Comments:0 | Tags:Breaking News Hacking Mobile 0-day Cross-site Request Forger

Asus lawsuit puts entire industry on notice over shoddy router security

In February 2014, thousands of Asus router owners found a disturbing text file saved to their devices.Further ReadingDear Asus router user: You’ve been pwned, thanks to easily exploited flawHackers expose eight-month-old Asus weakness by leaving note on victims' drives."This is an automated message being sent out to everyone effected [sic]," the message read
Publish At:2016-02-23 23:35 | Read:2399 | Comments:0 | Tags:Gear & Gadgets Law & Disorder Risk Assessment Technology Lab

DNS Hijacks: Routers

Our Support department has noticed a significant increase in the number of people that have had their DNS settings hijacked. Not only on their computers, but on their routers as well. For some background information on DNS hijacks, please read “DNS Hijacks: What to Look For”. How does it work? In a typical home setup, we have: A modem provided b
Publish At:2015-12-18 00:25 | Read:2615 | Comments:0 | Tags:Online Security default password dns hijack Pieter Arntz rou

3G/4G modems continue to be vulnerable

Researchers have conducted a series of tests on popular 3G/4G mobile modems (data dongles) and routers discovered an impressive number of serious flaws.  Sometimes old news came back threatening our cyber security, all because 3G/4G dongles keep in being as vulnerable as they were in the past. In the last report issued by the
Publish At:2015-12-04 00:20 | Read:1591 | Comments:0 | Tags:Breaking News Hacking Cross-site request forgery (CSRF) Cros

Backdoor infecting Cisco VPNs steals customers’ network passwords

Attackers are infecting a widely used virtual private network product sold by Cisco Systems to install backdoors that collect user names and passwords used to log in to corporate networks, security researchers said.A researcher from security firm Volexity told Ars that he's aware of about a dozen attacks successfully infecting Cisco's Clientless SSL VPN, but
Publish At:2015-10-08 23:15 | Read:2168 | Comments:0 | Tags:Risk Assessment Technology Lab backdoors Cisco Systems explo

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud