Internet of Things

13 Vulnerabilities in Hanwha SmartCams Demonstrate Risks of Feature Complexity

The researchers at Kaspersky Lab ICS CERT decided to check the popular Hanwha SmartCams and discovered 13 vulnerabilities. Wikipedia describes Attack…

6 years ago

Mobile App Flaws of SCADA ICS Systems Could Allow Hackers To Target Critical Infrastructure

IOACTIVE researchers warn that critical infrastructure mobile applications are being developed without secure coding compliance that could allow hackers to…

6 years ago

Brickerbot botnet, the thingbot that permanently destroys IoT devices

Security researchers have spotted a new threat dubbed Brickerbot botnet that causes permanent damage to Internet of Things (IoT) devices.…

7 years ago

IoT – Shocking : How your home sockets could aid in Cyber attacks

IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I…

8 years ago

Top Security Priorities of the Internet of Things

The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution.…

8 years ago

A flaw in the D-LINK WI-FI camera affects more than 120 products

A vulnerability in the firmware running on many D-Link products allows attackers to take over cameras and other 120 products.…

8 years ago

LizardStresser botnet is using IoT in recent 400Gbps DDoS Attack

The Lizardsquad’s botnet known as LizardStresser is now leveraging on Internet of Things devices, latest waves of DDoS attack reached…

8 years ago

Watch out, FLocker Ransomware targets Android smart TVs

The day has come, Sharp and Philips smart TV running the Android TV OS could be infected by a ransomware…

8 years ago

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

8 years ago

Hacking connected lightbulbs to breach Air-Gapped networks

Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two…

8 years ago

This website uses cookies.