• TOP
  • Smart Home

Smart Home

2018/02/04

Data Privacy in the Age of IoT

Data Privacy in the Age of IoT

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT — the Internet of Things?

2018/01/29

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

“Hide ‘N Seek” Botnet Uses Peer-to-Peer Infrastructure to Compromise IoT Devices

Botnets that target Internet of Things (IoT) devices are neither new nor rare, with the infamous Mirai perhaps being the most popular example. However, a new botnet dubbed “Hide ‘N Seek”, or HNS, is seemingly one of the first—along with the Hajime botnet—to use custom built peer-to-peer (P2P) communication for its infrastructure. The botnet has affected over 24,000 devices, including devices in the U.S. and Asia, as of the time of publication.

2018/01/18

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

CES 2018: Securing the Promise of Invaluable Convenience from New IoT Devices

The continuous development of Internet of Things (IoT) devices will reportedly push the global IoT market to grow from US$157 billion in 2016 to $457 billion by 2020. CES (Consumer Electronics Show), the gathering place for all those who thrive on the business of consumer technologies, hosted its annual event at the Las Vegas Convention Center to showcase what’s in store for the market this year.

2018/01/04

Source Code of IoT Botnet Satori Publicly Released on Pastebin

Source Code of IoT Botnet Satori Publicly Released on Pastebin

In early December last year, Satori affected 280,000 IP addresses in just 12 hours, ensnaring numerous home routers to become part of its botnet.

2017/12/27

The Need for Better Built-in Security in IoT Devices

The Need for Better Built-in Security in IoT Devices

To see just how safe and secure IoT devices are and to what extent an attacker can manipulate an IoT device, we tested the built-in security of a particular IoT device type — internet-connected speakers.

2017/12/21

5 Smart Ways to Enjoy a Hack-Free Holiday

 5 Smart Ways to Enjoy a Hack-Free Holiday

'Tis the season to be jolly ... and enjoy your holiday haul! New gear normally arrives at this time of year (maybe an iPhone X?), but new devices come with new risks. Even if you have smart online shopping habits, your new tech can put your privacy in jeopardy, or worse.

2017/12/04

New Mirai Attack Attempts Detected in South America and North African Countries

New Mirai Attack Attempts Detected in South America and North African Countries

Just a few days ago, the notorious Internet of Things (IoT) botnet known as Mirai (detected by Trend Micro as ELF_MIRAI family) was detected as being active in a new campaign targeting Argentina, when red flags were raised after an increase in traffic on ports 2323 and 23.

2017/11/27

New Mirai Variant Found Spreading like Wildfire

New Mirai Variant Found Spreading like Wildfire

A security researcher reportedly discovered a new variant of Mirai (identified by Trend Micro as ELF_MIRAI family) that is quickly spreading. A notable increase in traffic on port 2323 and 23 was observed over the weekend, with around 100 thousand unique scanner IPs coming from Argentina.

2017/11/15

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Wearable internet-of-things (IoT) devices like smartwatches can help parents keep an eye on their children while also providing them the independence and connectivity they need for their lifestyle and activities.

2017/10/23

Security Risks in a Technology-Driven World

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

2017/10/19

Google Home Mini Speaker Discovered Eavesdropping on Home User

Google Home Mini Speaker Discovered Eavesdropping on Home User

Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One similar incident involving Google’s Home Mini speaker was discovered by Artem Russakovskii of Android Police, who reported that the device was listening and recording all the sounds it picks up in its vicinity.

2017/10/16

Vulnerabilities in WPA2 Reportedly Expose Wi-Fi-Enabled Devices to Eavesdropping

Vulnerabilities in WPA2 Reportedly Expose Wi-Fi-Enabled Devices to Eavesdropping

Several security flaws in the Wi-Fi Protected Access 2 (WPA2) protocol were recently disclosed, which can reportedly expose wireless devices to Key Reinstallation AttaCK (KRACK), a proof-of-concept exploit that compromises WPA2’s encryption mechanism. KRACK involves “manipulating and replaying cryptographic handshake messages”—the process of establishing parameters for systems and devices to communicate with each other.

2017/10/12

By the Numbers: Are Your Smart Home Devices Being Used as Cryptocurrency Miners?

By the Numbers: Are Your Smart Home Devices Being Used as Cryptocurrency Miners?

Most people are familiar with malware that encrypt files for ransom or attempts to steal information, but now cybercriminals are devoting resources to directly chasing cryptocurrency. This way, they can bypass any obstacles and directly go for a decentralized—and rapidly appreciating—currency that guarantees anonymity.

2017/09/29

RouteX Malware Found Exploiting Remote Access Vulnerability in Netgear Routers

RouteX Malware Found Exploiting Remote Access Vulnerability in Netgear Routers

A remote access and command execution vulnerability (CVE-2016-10176) was recently seen actively exploited by RouteX, a malware that targets Netgear routers. RouteX is designed to turn an infected router into a Socket Secure (SOCKS) proxy that in turn limits access to the device to the attacker.

2017/09/25

IoT Device Security At Home

IoT Device Security At Home

My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security system. She asked if her privacy might be at risk.

PageTop