Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

Author of record-setting IoT botnets pleads guilty

Credit to Author: Lisa Vaas| Date: Thu, 05 Sep 2019 13:44:37 +0000

He kept working on new botnets (and swatting a co-conspirator-cum-competitor) while indicted and on supervised release.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/GTqVr4bD8sE” height=”1″ width=”1″ alt=””/>

Read more

Botnet targets set-top boxes using Android OS

Credit to Author: John E Dunn| Date: Fri, 30 Aug 2019 12:07:32 +0000

Production systems aren’t supposed to have the ADB turned on, but some set-top boxes do.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/YVYbkKJr18k” height=”1″ width=”1″ alt=””/>

Read more

Android based IoT devices with open ADB port inviting easy attacks by Crypto-miners

Credit to Author: Sushmita Kalashikar| Date: Wed, 07 Aug 2019 11:10:07 +0000

The rapid pace at which connected smart home devices are increasing, have opened the gates for a new era of cyber-attacks on IoT devices including smart phones, TVs, IP cameras, etc. These attacks are mostly in the form of crypto mining attacks wherein cryptocurrency-mining botnet enters the targeted device via…

Read more

Trinity Miner using open ADB port to target IoT devices

Credit to Author: Vallabh Chole| Date: Fri, 26 Jul 2019 10:08:11 +0000

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are becoming smarter. All these IoT devices are powered by ARM-based processor and run on android and unix operating system. These IoT devices include mobiles, smart T.V., routers, IP cameras and…

Read more

Google patches 8 security holes in Nest cameras

Credit to Author: John E Dunn| Date: Wed, 21 Aug 2019 11:02:22 +0000

The list of vulnerabilities recently discovered by researchers relate to one model, the Nest Cam IQ Indoor camera.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/b8ycfMnDE9o” height=”1″ width=”1″ alt=””/>

Read more

Google’s Nest webcam needs patching after flaws found

Credit to Author: John E Dunn| Date: Wed, 21 Aug 2019 11:02:22 +0000

The list of vulnerabilities recently discovered by researchers relate to one model, the Nest Cam IQ Indoor camera.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/b8ycfMnDE9o” height=”1″ width=”1″ alt=””/>

Read more

Facial recognition technology: force for good or privacy threat?

Credit to Author: Christopher Boyd| Date: Mon, 12 Aug 2019 15:00:00 +0000

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.

Read more

8 ways to improve security on smart home devices

Credit to Author: Kayla Matthews| Date: Wed, 07 Aug 2019 15:00:00 +0000

Smart home devices aren’t the most secure, but they do make life more convenient. How can those who’ve embraced smart home tech stay as secure as possible? Here are eight ways.

Categories:

Tags:

(Read more…)

The post 8 ways to improve security on smart home devices appeared first on Malwarebytes Labs.

Read more

Researchers hack camera in fake video attack

Credit to Author: Danny Bradbury| Date: Thu, 01 Aug 2019 12:03:13 +0000

Tampering with surveillance cameras is a common activity for Hollywood heroes and criminals alike. Now, researchers have shown how they can do it in real life.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/t4JcdCzKtZI” height=”1″ width=”1″ alt=””/>

Read more