The IoT has opened new avenues for creating and consuming media and entertainment. To fully benefit from these innovations, users must be aware of and deal with the risks that devices could bring into their homes.
As cybercriminals compete for dominance in their bid to create powerful botnets, users can make their own stand against warring sides by understanding how botnet malware works and securing their devices.
Access control devices that use facial recognition manage entry and exit into an enterprise’s premises. They are essentially the first line of defense for many businesses, but are they secure?
As the IoT continues to become more integrated into enterprise and home spaces, the threat landscape also expands. We look at the most significant threats and vulnerabilities in IoT devices on the edge of the network, within the network itself.
Researchers discovered a vulnerability in Amazon’s Ring Video Doorbell Pro that, if exploited, could allow a threat actor to get network or Wi-Fi credentials.
A couple discovered that their Nest security system was hacked after their thermostat was repeatedly set to high temperatures despite being adjusted and the hacker started talking to them via the camera.
Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.