According to Catalin Cimpanu of Bleeping Computer: Since mid-September, a new IoT botnet has grown to massive proportions. Codenamed IoT_reaper (Reaper for this article), researchers estimate its current size at nearly two million infected devices. According to researchers, the botnet is mainly made up of IP-based security cameras, network video recorders (NVRs), and digital video recorders … Continue reading Is a virus infecting millions of internet-connected cameras coming to a construction job site near you?
Internet of Things, or IoT, is the concept in which everyday objects such as lightbulbs, thermostats, garage door openers, etc. are imbued with network connectivity and the capability for communicating with other devices. But just as is the case with our computers and other networked devices, security is an increasingly critical factor. This was made … Continue reading Another reminder of the potential risks associated with the Internet of Things (IoT)
The upside to using modern electronic/smart door security systems in hotels across the globe is that it is really easy to check guests in and out, replace lost keys, and prevent former guests from reusing their key to gain unauthorized access.
The downside is that the smarter these security systems become, the more susceptible they become to hacking. Continue reading “Building security and safety susceptible to attack by hackers – this time it was a luxury hotel”
Two-factor authentication has long been seen as the ultimate security tool. It works by requiring a second-device for logging into the primary device. According to a blog post from Samsung, researchers have successfully tested an exploit that uses malware on an Android device to create s black door allowing attackers to circumvent two-factor authentication. Here … Continue reading This is not good: Two-Factor Authentication defeated
With great power comes great responsibility — and when it comes to empowering everyday devices with the ability to connect to the internet, manufacturers have a responsibility to protect consumers. As the much bandied about “Internet of Things” continues to become “a thing,” the real-world implications of lax security will become a much more pressing … Continue reading The potential dark side of the Internet of Things
Each year in Las Vegas, elite hackers from around the world gather at DEFCON to discuss the latest trends in computer network security. Do some googling if you are interested in learning more about the event… This year, Daniel “unicornFurnace” Crowley, Jennifer Savage and David Bryan will present a topic that should cause professionals in … Continue reading Smart Toilets and Home/Building Automation Systems May Create Security Vulnerabilities
Rich Mogull recently published some tips at Macworld for securing the data on your iPad.
Because there are currently no known remote attacks against iPads, the biggest security risk is physically losing the device. Thus, the first step is to make sure… Continue reading How To Secure Your iPad
Twitter closed an ugly cross site scripting hole in its Web page Tuesday morning, but not until a fast moving attack, including at least two Twitter worms, compromised hundreds of thousands of user accounts. At its height, the attacks were hitting 100 … Continue reading Twitter Closes Hole After Attack Hits Up To 500K Users
Apple may have a reputation as a security leader, but it’s not entirely accurate. Its OS can be hacked like any other (at hacking conventions like Def Con, Mac OS has not proven significantly more secure than Windows), and now, blogger and white hat ha… Continue reading Major Flaw in Apple’s Safari Browser Gives Hackers Access to Personal Information