All posts in IoT
07 Sep, 2023
devices, engineering, Internet of things, IoT, IT, media player, mobile devices, OT, PC, Ransomware, Security, Security News, virtual machines, workstations
0

Phones, tablets and workstations with unpatched CVEs are a clear and present danger. New Armis study lists the most vulnerable. Image: AndSus/Adobe Stock Asset visibility and security company Armis identified connected assets posing the greatest risks to global enterprise. Armis’ new research, based on analysis from its Asset Intelligence Engine, . . . Read more
24 Aug, 2023
cybercrime, Data loss, Hacking, IoT, Naked Security Podcast, podcast, Privacy, Security News, TP-LINK, Vulnerability, WinRAR
0

by Paul Ducklin HOW MANY CRYPTOGRAPHERS? No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify and anywhere that good podcasts are found. Or just drop the . . . Read more
13 Apr, 2023
Apple, cybercrime, exoploit, Hacking, IoT, Microsoft, Naked Security Podcast, podcast, Security News, Vulnerability, zero day
0

by Paul Ducklin I’M SORRY, DAVE, I’M AFRAID… SORRY, MY MISTAKE, I CAN DO THAT EASILY No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher . . . Read more

by Paul Ducklin Cybersecurity researcher Sam Sabetan yesterday went public with insecurity revelations against IoT vendor Nexx, which sells a range of “smart” devices including door openers, home alarms and remotely switchable power plugs. According to Sabetan, he reported the bugs to Nexx back in January 2023, but to no . . . Read more

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. Image: Peter/Adobe Stock Imagine a cybercriminal hacking into an internet-facing webcam set up in your organization and spying on a meeting, a manufacturing process or an . . . Read more
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Belgian researcher Lennert Wouters revealed at Black Hat how he mounted a successful fault injection attack on a user terminal for SpaceX’s satellite-based internet system
Environmentalists and policymakers warn water treatment plants are ripe for attack.
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
Malware borrows generously from code used by other botnets such as Mirai, Qbot and Zbot.