Is a virus infecting millions of internet-connected cameras coming to a construction job site near you?

According to Catalin Cimpanu of Bleeping Computer: Since mid-September, a new IoT botnet has grown to massive proportions. Codenamed IoT_reaper (Reaper for this article), researchers estimate its current size at nearly two million infected devices. According to researchers, the botnet is mainly made up of IP-based security cameras, network video recorders (NVRs), and digital video recorders … Continue reading Is a virus infecting millions of internet-connected cameras coming to a construction job site near you?

Another reminder of the potential risks associated with the Internet of Things (IoT)

Internet of Things, or IoT, is the concept in which everyday objects such as lightbulbs, thermostats, garage door openers, etc. are imbued with network connectivity and the capability for communicating with other devices. But just as is the case with our computers and other networked devices, security is an increasingly critical factor. This was made … Continue reading Another reminder of the potential risks associated with the Internet of Things (IoT)

Building security and safety susceptible to attack by hackers – this time it was a luxury hotel

The upside to using modern electronic/smart door security systems in hotels across the globe is that it is really easy to check guests in and out, replace lost keys, and prevent former guests from reusing their key to gain unauthorized access.

The downside is that the smarter these security systems become, the more susceptible they become to hacking. Continue reading “Building security and safety susceptible to attack by hackers – this time it was a luxury hotel”

This is not good: Two-Factor Authentication defeated

Two-factor authentication has long been seen as the ultimate security tool. It works by requiring a second-device for logging into the primary device. According to a blog post from Samsung, researchers have successfully tested an exploit that uses malware on an Android device to create s black door allowing attackers to circumvent two-factor authentication. Here … Continue reading This is not good: Two-Factor Authentication defeated

The potential dark side of the Internet of Things

With great power comes great responsibility — and when it comes to empowering everyday devices with the ability to connect to the internet, manufacturers have a responsibility to protect consumers. As the much bandied about “Internet of Things” continues to become “a thing,” the real-world implications of lax security will become a much more pressing … Continue reading The potential dark side of the Internet of Things

Smart Toilets and Home/Building Automation Systems May Create Security Vulnerabilities

Each year in Las Vegas, elite hackers from around the world gather at DEFCON to discuss the latest trends in computer network security. Do some googling if you are interested in learning more about the event… This year, Daniel “unicornFurnace” Crowley, Jennifer Savage and David Bryan will present a topic that should cause professionals in … Continue reading Smart Toilets and Home/Building Automation Systems May Create Security Vulnerabilities