Internet of Things

Hacking back the Mirai botnet, technical and legal issues

Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back…

7 years ago

24 hours in the life of my home router by Francisco J. Rodriguez

Recently a massive DDoS attack has disconnected a large portion of users from the Internet, hackers exploited IoT devices. Is your…

8 years ago

Hackers offered an loT botnet for $7,500. The recent attack may be just a test

The security firm RSA revealed to have discovered in early October, hackers advertising access to a huge IoT botnet on…

8 years ago

Massive DDoS attack against Dyn DNS service, how and why

A massive DDoS attack targeted the Dyn DNS service and caused an extended Internet outage. How the attackers powered the…

8 years ago

The Mirai botnet is targeting also Sierra Wireless cellular data gear products

Sierra Wireless is warning its customers to change factory credentials of its AireLink gateway communications products due to Mirai attacks.…

8 years ago

Exclusive – ELF Linux/NyaDrop, a new IoT threat in the wild

Exclusive: interview made by @unixfreaxjp of MalwareMustDie for Security Affairs about the Linux/NyaDrop. The latest details about this new dangerous…

8 years ago

MITRE will award $50,000 for a solution that detects rogue IoT Devices

MITRE has challenged the security community to devise new methods that could help in detecting rogue IoT devices on a…

8 years ago

Reverse engineering a Smarter Coffee machine for fun and a security lesson

Simone Margaritelli has done a reverse engineering of the Smarter Coffee IoT Machine Protocol to control the machine from his…

8 years ago

150,000 IoT Devices behind the 1Tbps DDoS attack on OVH

The hosting provider OVH continues to face massive DDoS attacks launched by a botnet composed at least of 150000 IoT…

8 years ago

Car Hacking – Chinese hacker team remotely hacked Tesla Model S

A group of security researchers from the Chinese firm Tencent have found a series of flaws that can be exploited…

8 years ago

This website uses cookies.