Browsing tag

IoT

Smart home devices can be hacked within minutes through Google search

The Internet of Things (IoT) devices, especially smart home devices, are built to get things done conveniently and to some extent, these devices have been playing a major role in our lives. At the same time, these smart devices are also home to critical security vulnerabilities. Recently, the IT security researchers at the Ben-Gurion University […]

Keep Your Home Warm with this cryptomining heater

Recently, a French startup Quarnot introduced a cryptomining heater that is capable of paying for itself at some point through harnessing huge reserves of heat that get generated while CPU is busy mining for the cryptocurrency. Labeled as Quarnot’s QC1, the heater is said to keep your house warm during the torturous winter season and […]

Cortana Lets Hackers Infect Windows PC Even when it is Locked

The voice commands enabled, multi-language Cortana virtual assistant is probably the most talked about feature that comes with Windows 10 desktop and mobile versions. It performs a number of special functions to help users including opening apps, informing about discount coupons and carrying out basic mathematic calculations. Cortana contained a critical vulnerability From the outlook, […]

Over 50,000 baby monitors can be hacked but its vendor is AWOL

Hacking baby monitors is nothing new but the fact that there are thousands of vulnerable baby monitors out there is a big concern. Recently, the IT security researchers at Austrian firm SEC Consult have discovered a set of critical vulnerabilities in Mi-Cam baby monitors which allow hackers to take full control of these devices and spy on children. Mi-Cam […]

DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits

IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete control of the targeting network systems. IoT based cyber Attacks are blooming since the number IoT devices are increasing rapidly and attackers always find the many ways to bypass it. In this case, Doubledoor Botnet […]

Strava’s Global Heat Map Exposes User Locations Including Military Bases

Strava is a GPS tracking and fitness-tracker app manufacturer that is currently making headlines for introducing the Global Heat Map, which relies upon satellite information for identifying locations and movements of its subscribers for two years’ period. With 27 million users on board from across the globe (including those using Vitofit, Fitbit and Jawbone) Strava […]

A Vulnerability in Kernel Slowing Down Intel Processors

Register first notices a significant vulnerability in all Intel processor chips. The major design flaw in Linux kernel patch is going to make a huge impact, and all operating systems will have to be updated. The computers out of the production line and this patch will have a major effect on the performance. The Register […]

The 5 Cyber Security Predictions for 2018

Looking at what happened in 2017, the Equifax breach, Ransomware WannaCry, Russian interference, phishing scams. Well, one has to be prepared for more in 2018. There will be bigger breaches, bigger scams and the security teams and budget will find it difficult to keep pace with the criminals. This brings in the factor that user […]

New Year and New Measures for Cybersecurity

Time for resolution as the New Year approaches, whether we plan for fitness to lose weight or spend quality time with friends and family. Nevertheless, one in ten people manage to stick on to their plan, similarly, one in seven people think about cybersecurity as a priority. CISOs as it comes into existence to enhance the […]

Bose & Sonos Smart Speakers can be Hacked to Play Disturbing Sounds

Another day, another IoT flaw – Sonos and Bose Smart Speakers Vulnerable to be Hacked Remotely to Play Sounds of Hackers’ Choice. With smart technology, it is very important to remain alert and aware enough about security loopholes otherwise you can prepare yourself for dire consequences. According to security experts at Trend Micro, some of […]

2018 cybersecurity trends and predictions

The year 2017 was quite exciting as we came across several new things from Ransomware to IoT malware and more. Several industries found themselves gripped at the mercy of the hackers and criminals. The vulnerabilities in Windows which was made known to us by these same hackers. Anyway, we have all had our share of […]

Spoofed Emails from Supposedly Corporate Printer Vendors Install Backdoor

Corporate printers and scanners related emails are quite common in large organizations and this particular aspect is now deemed as a potential opportunity for exploitation by cybercriminals. According to the findings of Barracuda Networks, there is a sudden rise in attacks involving HP, Canon and Epson printer and scanner email attachments. Reportedly, hackers have launched […]

Thousands Of IoT Devices Are Vulnerable To Remote Code Execution

Security researchers from security firm Elttam have discovered a critical vulnerability (tracked as CVE-2017-17562) in GoAhead tiny web server that affects many IoT devices, the vulnerability allows attacker to execute malicious code remotely on affected devices. According to the researchers: This blog post details CVE-2017-17562, a vulnerability which can be exploited to gain reliable remote […]

Vulnerability in Intel Chip Puts Million of Devices at Risk

Intel the giant in chip making is in the news for all the wrong reason. It has been reported that the chip has vulnerabilities that will put millions of devices at risk. Researchers from Positive Technologies during the Black Hat Conference in Europe said that a particular flaw in Intel Chip stands to make devices […]

PayPal Phishing Scam Coming From Official PayPal Email Address

PayPal phishing scams are becoming more and more sophisticated these days, with hackers devising newer ways of duping users. There are reports of a new and very sophisticated PayPal phishing scam that could dupe a rather clever user into parting with valuable personal information. This scam, which attempts to steal everything related to a PayPal […]

Gone in Seconds: Hackers Steal Mercedes Car without Key

A surveillance video shared by West Midlands Police, United Kingdom shows car hacking thieves stole a Mercedes within a few seconds without keys and even without touching the vehicle – Thanks to a relay device. A relay box is an electrically operated switch which works in such a way that other than the metal it can detect and […]

Researchers demonstrate Amazon Key system can be hacked

Rhino Security Labs’ researchers have discovered a vulnerability in Amazon’s Key delivery service and Cloud Cam security camera. This vulnerability allows an attacker to manipulate the functioning of the camera to make it go offline due to which it will not be possible to monitor if someone entered a home or not. It is worth […]

Germany bans kids smartwatches, asks parents to destroy them

Garmany’s Telecoms regulator the Federal Network Agency (The Bundesnetzagentur) which oversees the country’s telecommunications has banned smartwatches for kids in the country calling them spying devices. It has also urged parents to destroy these watches mostly used by children between the ages of 5 and 12 years. The decision came months after the agency banned “My Friend […]

School cafeteria TV monitor plays porn leaving students baffled

A Clayton County, Georgia, high school played pornographic content on its TV monitor in the presence of students during lunch leaving them baffled. One of the students, a 10th grader, took a photo of the monitor screen and texted it to her mother (Daphne Raines) who told WPXI that the image was “too graphic to show.” Raines, […]

Telnet IoT Honeypot – Python Telnet Honeypot For Catching Botnet Binaries

This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default passwords on telnet servers on the internet. Other than https://github.com/stamparm/hontel or https://github.com/micheloosterhof/cowrie (examples), which provides full (via chroot) or simulated behaviour of a linux system this honeypots goal is just to collect statistics […]

Researchers hack vacuum cleaner; turn it into perfect spying device

According to the findings of Check Point researchers, there is a vulnerability in the LG smart home infrastructure through which hackers can take full control of an authentic user account and later remotely hijack LG SmartThinq home appliances including refrigerators, dryers, dishwashers, microwaves and robotic vacuum cleaners. When a user leaves any of these devices […]