21 Oct 2019

Alexa and Google Home abused to eavesdrop and phish passwords

Threat actors can use malicious applications in order to eavesdrop on Amazon Alexa and Google Home users, researchers with Security Research Labs have discovered. Rogue applications can also be used to carry out phishing attacks targeting owners of one of these voice assistants. The two attacks developed by the researchers

Read More
18 Oct 2019

Security still top priority as more enterprises scale IoT solutions company-wide

A new survey by  Zebra Technologies Corporation shows that 61% of companies across the globe are on track to become “intelligent enterprises” based on an index that takes into account their use of Internet of Things (IoT) devices, data management, intelligent analysis and various other factors. Last year, just under

Read More
16 Oct 2019

1 in 5 IT security professionals fear their connected toilets will be hacked

Most IT security professionals are worried about cyber risk resulting from poorly secured Internet-of-things (IoT) devices, a new nCipher survey found. 68% of respondents are concerned about threat actors changing the functionality of IoT devices, while 54% worry that hackers may remotely take control of IoT devices for malicious purposes.

Read More
16 Oct 2019

Kaspersky honeypots find 105 million attacks on IoT devices in first half of 2019

In the first half of 2019, Kaspersky registered 9 times as many attacks on its Internet of Things (IoT) honeypots as it did in the same period last year, a new report shows. Honeypots are decoy systems used for analyzing cyber threats. The vast majority of attacks involved the infamous

Read More
14 Oct 2019

Consumers concerned about connected home privacy, still few implement safety practices

35% of US citizens are worried that threat actors may be able to obtain authorized access to their home network by hacking into smart devices, a new ESET survey found. Despite these concerns, just 20% of respondents try to find out how data is collected, stored and shared by smart

Read More
07 Oct 2019

DHS and FDA warn about much broader impact of Urgent/11 vulnerabilities

Urgent/11, a range of security vulnerabilities that were initially thought to impact only the VxWorks real-time operating system (RTOS), actually put many more systems at risk, the US Department of Homeland Security (DHS) and the US Food and Drug Administration (FDA) warned last week. Earlier this year, security researchers with

Read More
03 Oct 2019

Dutch police take down hornets’ nest of DDoS botnets

A “bulletproof” hosting provider used by cybercriminals to host dozens of Internet-of-things (IoT) botnets has been taken down by Dutch police. The company, called KV Solutions BV, was popular among cybercriminals because it refused to take action against its customers, even if they were using the hosting services for criminal

Read More
23 Sep 2019

The Most Common And Insecure Password Revealed—It’s Not 123456 Or Admin

Internet of Things (IoT) devices are know for their poor security, including the presence of default login credentials that make many of these devices laughably easy to hack. While weak default passwords like “admin” and “123456” are notoriously common, a new study by Avira shows that the most common weak

Read More
17 Sep 2019

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

New research by Independent Security Evaluators has uncovered a total of 125 security vulnerabilities in small office/home office (SOHO) routers and network-attached storage devices (NAS). The researchers tested 13 devices in total, from vendors including Asus, Lenovo and Netgear. The report warns that all of the devices under scrutiny “had

Read More
16 Sep 2019

Cyberattacks On IOT Devices Surge 300% In 2019, ‘Measured In Billions’, Report Claims

A new report by F-Secure warns that cyberattacks on IoT devices are accelerating at an unprecedented rate. The company uses a network of honeypots to attract everyday attacks and discovered more than 2.9 billion attack events in the first half of 2019. Security researchers noted that the honeypots were dominated

Read More