Browsing tag

IoT

Metasploit Can Be Directly Used For Hardware Penetration Testing Now

Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate real-world attacks against software and networks . Rapid7 has added a hardware bridge to its Metasploit penetration testing framework, making it easier for users to analyze Internet of Things (IoT) devices. IoT’s growing up Vastly […]

Security Flaw in LG IoT Software Left Home Appliances Vulnerable

LG has updated its software after security researchers spotted a flaw that allowed them to gain control of devices like refrigerators, ovens, dishwashers, and even access the live feed from a robot vacuum cleaner. The vulnerability, dubbed HomeHack, potentially affects millions of LG SmartThinQ home appliances. It was uncovered by researchers at Check Point, who […]

One Million Organisations hit in under a Month with a Massive IoT botnet

The Internet of Things or IoT refers to the vast network of connected devices or “things” connected to the Internet which can be used to exchange and collect data. IoT devices include anything smartphones, smart appliances, healthcare devices, traffic monitoring cameras etc. Much like anything these days, even IoT can come under attack by those […]

A New IoT Botnet Threatens to Take Down the Internet

Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary, security researchers are now warning of a brand new rapidly growing IoT botnet. Dubbed ‘IoT_reaper,’ first spotted in September by researchers at firm Qihoo 360, the new malware no longer depends on cracking weak passwords; […]

Google Home Mini Secretly Recorded Conversations Due to “Flawed Touch Panel”

We often hear about smart home speakers eavesdropping on all the conversations inside the home because these are already equipped with the technology to overhear and transmit the recorded data, including your conversations, to the company that manufactures it or hackers if the device has been compromised. However, when the manufacturer is Google, we tend […]

Hackers can identify if you are using sex toys and exploit them

Smart Sex Toys Can Be Switched On/Off and Exploited Remotely – Thanks To A Vulnerability. Pen Test Partners (PTP) is a security group comprising of white hat hackers. Reportedly, PTP researchers have identified that it is quite easy to take control of Bluetooth butt plugs. This means, playing with your smart toys without even entering […]

Hikvision Security Cams Compromised to Display “HACKED”

If you own Hikvision security cameras you would have noticed the sudden change in the live feed display where the normal footages were replaced with the term HACKED. However, it isn’t the case with all Hikvision security cameras but only some of them but if you are the owner of one such camera then it […]

Hackers Can Remotely Access Wireless Syringe Infusion Pump

Another day, another set of critical vulnerabilities in wireless medical devices – This time; high severity flaws identified in Smiths Medical Syringe Infusion Pumps. The Medfusion 4000 Wireless Syringe Infusion Pump that is manufactured by Minnesota-based firm Smiths Medical is reportedly plagued with not one or two but eight vulnerabilities. Some of these can easily […]

Critical vulnerability lets hackers play with safety system of modern cars

According to the latest research from a collaborative team of researchers from Linklayer Labs, Politecnico di Milano and Trend Micro’s Forward-looking Threat Research (FTR) the modern vehicles are all plagued with a vulnerability that allows a denial-of-service (DoS) attack to be carried out. This vulnerability is so extensive that it would need a generation of cars […]

Hacker unlocks vehicle for family who’d lost keys months ago

Our world is full of good and bad people and same applies for hackers. Where there are hackers eager to use their skills for wrong purposes and we have this hacker who made sure he utilized his skills to help a family in need. News has come out revealing that a hacker whose name is […]

Self-Driving Cars Can Be Tricked Into Misreading Street Signs

We know that this is the age of smart gadgets and self-operational machines. However, the cons associated with such devices easily surpass their pros. The case is same with self-driving technology. Although the technology is evolving every passing year the vulnerabilities and loopholes that are constantly expanding present a point of concern for automobile experts, […]

A Dangerous Vulnerability in Solar Panels can Cause Power Outage

Willem Westerhof, a cybersecurity researcher at Dutch security firm ITsec, has identified a serious vulnerability in an essential component of solar panels, the inverter. If this flaw is exploited then European power grids will be severely affected, and there is a threat of widespread outages. According to Westerhof, the flaw is present in thousands of […]

Amazon Echo Can Be Hacked to act as a Surveillance device

Taking over an IoT (Internet of Things) device is nothing new for hackers, but since users have become increasingly dependent on smart devices, the vulnerabilities have increased as well. Recently, a security researcher has discovered that Amazon Echo or Echo, a smart speaker developed by Amazon is vulnerable to physical hack attack. In this attack, an attacker with physical access […]

Watch: Hackers take over Tesla Model X; control brakes and doors

The hackers from Keen Security Labs, a part of Chinese Internet giant Tencent Holdings discovered some critical security flaws in Tesla Model X “holiday show” easter egg allowing them to take over the vehicle remotely. Upon gaining control, the hackers turned on its brakes, adjusted the lights, so they blink with the music streaming from the car’s radio, opened the […]

Watch: Researcher hacking, unlocking a smart gun with $15 magnets

A $1500 smart gun developed with the main objective of reducing gun crime has an inherent security flaw, which is so huge that even $15 magnets can expose it. This smart gun model called Armatix IP1 allows the owner to open fire only if the company’s smartwatch near by the gun. However, the presence of such […]

Hackers can take over Car Wash, trap you and smash your vehicle

It is understandable to receive Internet of Things (IoT) related warnings like vulnerable public WiFi or charging spots that can be hacked but a drive-through car wash? Well, it turns out Internet connected car washes or smart car washes can be hacked and trap the customer inside with their vehicle or even smash it while you in […]

Casino Becomes Victim of Data Hack—courtesy Fish Tank

It is a fact that the soaring number of internet-connected devices has made it easier for cyber-criminals to fulfill their malicious objectives without much ado. The weak security of these devices has helped bad guys greatly as data hacks have become so common and regular. Phishing is a well-known term in the cyber-security community, and […]

Remotely Controllable Hoverboards Latest Target of Hackers

Without a doubt, hoverboards are the latest fad. Hoverboards are indeed very useful as these aren’t only easy to use but make traveling so much fun. The recent trend of trying to make every device internet connection has not spared hoverboards; they even come with rider applications.  The app allows the user to perform cool […]

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

Attackers using the SambaCry vulnerability to target older versions of Samba(3.5.0) to upload and execute the malicious payload. SambaCry Vulnerability(CVE-2017-7494) have the similarities of SMB vulnerability exploited by WannaCry. Security experts from TrendMicro detected a Malware ELF_SHELLBIND.A which is similar to the functionality of SambaCry and this is the first payload with SambaCry that doesn’t […]

Millions of IoT Devices Infected with “Devil’s Ivy” Remote Code Execution Vulnerability Including Internet Connected Cameras

A New Vulnerability called  “Devil’s Ivy” Discovered that infected Tens of Millions of IoT Devices which leads to Remotely Execute the code in IoT’s including cameras and Card Readers. A stack Buffer over Flow Vulnerability  Presented in the many IoT Devices that cause Devil’s Ivy results in remote code execution and open source third-party code […]