• TOP
  • Smart Home

Smart Home

2017/11/27

New Mirai Variant Found Spreading like Wildfire

New Mirai Variant Found Spreading like Wildfire

A security researcher reportedly discovered a new variant of Mirai (identified by Trend Micro as ELF_MIRAI family) that is quickly spreading. A notable increase in traffic on port 2323 and 23 was observed over the weekend, with around 100 thousand unique scanner IPs coming from Argentina.

2017/11/15

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Vulnerabilities Found in Kids’ Smartwatches Pose Security Risks

Wearable internet-of-things (IoT) devices like smartwatches can help parents keep an eye on their children while also providing them the independence and connectivity they need for their lifestyle and activities.

2017/10/23

Security Risks in a Technology-Driven World

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

2017/10/19

Google Home Mini Speaker Discovered Eavesdropping on Home User

Google Home Mini Speaker Discovered Eavesdropping on Home User

Of all the potential horror stories that dissuade users from adopting Internet of Things (IoT) devices, one of the most common is the unauthorized monitoring of their private lives. One similar incident involving Google’s Home Mini speaker was discovered by Artem Russakovskii of Android Police, who reported that the device was listening and recording all the sounds it picks up in its vicinity.

2017/10/16

Vulnerabilities in WPA2 Reportedly Expose Wi-Fi-Enabled Devices to Eavesdropping

Vulnerabilities in WPA2 Reportedly Expose Wi-Fi-Enabled Devices to Eavesdropping

Several security flaws in the Wi-Fi Protected Access 2 (WPA2) protocol were recently disclosed, which can reportedly expose wireless devices to Key Reinstallation AttaCK (KRACK), a proof-of-concept exploit that compromises WPA2’s encryption mechanism. KRACK involves “manipulating and replaying cryptographic handshake messages”—the process of establishing parameters for systems and devices to communicate with each other.

2017/10/12

By the Numbers: Are Your Smart Home Devices Being Used as Cryptocurrency Miners?

By the Numbers: Are Your Smart Home Devices Being Used as Cryptocurrency Miners?

Most people are familiar with malware that encrypt files for ransom or attempts to steal information, but now cybercriminals are devoting resources to directly chasing cryptocurrency. This way, they can bypass any obstacles and directly go for a decentralized—and rapidly appreciating—currency that guarantees anonymity.

2017/09/29

RouteX Malware Found Exploiting Remote Access Vulnerability in Netgear Routers

RouteX Malware Found Exploiting Remote Access Vulnerability in Netgear Routers

A remote access and command execution vulnerability (CVE-2016-10176) was recently seen actively exploited by RouteX, a malware that targets Netgear routers. RouteX is designed to turn an infected router into a Socket Secure (SOCKS) proxy that in turn limits access to the device to the attacker.

2017/09/25

IoT Device Security At Home

IoT Device Security At Home

My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security system. She asked if her privacy might be at risk.

2017/08/24

How Secure are your Internet-Enabled Voice Assistants?

How Secure are your Internet-Enabled Voice Assistants?

Households all over the world are rapidly adopting conversational user interface (CUI) technology, or the tech behind the voice assistants we know as Siri, Alexa, Cortana, and Google Assistant. Reports say that over 24 million voice-enabled machines were shipped in 2017, and the growth shows no sign of stopping. As more of these devices become available, users are quickly using them to their fullest potential, creating increasingly connected homes.

2017/08/16

Trend Micro Reveals Top Ten Regions Affected by IoT Security Threats

Trend Micro Reveals Top Ten Regions Affected by IoT Security Threats

Smart home devices and applications took center stage at many tech events in 2017 from CeBIT to Computex, and even MWC 2017, as cybersecurity threats have continued to grow hand in hand with the increase of connected devices. Trend Micro Incorporated today released the “Trend Micro 2017 1H Smart Home Network Security Summary,” revealing the top 10 regions most affected by cyberattacks on a home router and identifying key factors for in-home cyber security threat.

2017/07/26

Expectations for Communication Service Providers on IoT Security

Expectations for Communication Service Providers on IoT Security

What used to be the stuff of science fiction has turned into reality. No longer do we dream of a world where devices around us are interconnected, share information with one another, and carry out actions autonomously — we are now living in it, thanks to the so-called Internet of Things (IoT).

2017/03/27

Protecting Physical Security Systems against Network Attacks

Protecting Physical Security Systems against Network Attacks

Every building—regardless of whether it accommodates enterprises or private owners—has security systems in place to protect valuable assets. These physical security systems range from simple access control, meaning doors and locks, to widespread surveillance systems and multiple alarms. And as these different systems grow more sophisticated, building administrators are finding ways to make managing them more convenient.

2017/03/08

Another Challenge For IoT: Open Backdoors

Another Challenge For IoT: Open Backdoors

Problems with hardcoded credentials are hitting consumer IoT devices, industrial SCADA devices, and even critical infrastructure. Despite the appeal on source code and firmware audition, this type of vulnerability recurs and threatens users’ privacy and data security.

2017/01/31

Securing Your Routers Against Mirai and Other Home Network Attacks

Securing Your Routers Against Mirai and Other Home Network Attacks

Do you know if your router has turned into a zombie? It could be part of a botnet responsible for the DDoS attacks that have been taking down company websites.
Last year, the Mirai botnet launched massive and widespread attacks by leveraging vulnerable connected devices (including routers, CCTV cameras, DVRs etc.) and turning them into weaponized zombies.

2017/01/31

Routers Under Attack: Current Security Flaws and How to Fix Them

Routers Under Attack: Current Security Flaws and How to Fix Them

How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed?
Last year, user Y, who is based in Brazil, lost R$600 (US$191.02, as of January 30, 2017) as a side effect of information theft. Upon discovering this, Y immediately called an IT technician to find the root cause. The technician originally chalked up the incident to Y accessing a fake website.

PageTop