Internet of Things

Pierluigi Paganini March 31, 2016
The Linux Remaiten malware is building a Botnet of IoT devices

Experts from the ESET firm have spotted a new threat in the wild dubbed Remaiten that targets embedded systems to recruit them in a botnet. ESET is actively monitoring malicious codes that target IoT systems such as routers, gateways and wireless access points, rather than computers or smartphones. Security researchers from ESET have discovered a new threat dubbed KTN-RM or Remaiten that targets Internet […]

Pierluigi Paganini November 09, 2015
Is it possible to use coffee machines and stay safe from hackers?

Kaspersky Lab issued a report that warns users of the possible risks when facing with connected coffee machines and other wireless-enabled home devices. The paradigm of the Internet of Things has dramatically enlarged our surface of attack, smart devices surrounding us are a privileged target for cyber criminals. What about your coffee machine? The coffee machines could become […]

Pierluigi Paganini October 23, 2015
Crooks are hacking CCTV Cameras to launch severe DDoS attacks

Imperva has discovered that attackers hijack CCTV cameras to launch powerful DDoS attacks exploiting weak credentials and poor configurations of IoT devices. Internet of Things devices are becoming privilege targets of threat actors that daily abuse of their resources to run cyber attacks or to organize frauds or to spy on unaware users. Unfortunately, most IoT devices […]

Pierluigi Paganini October 22, 2015
Fitbit trackers can be infected with a malware in just 10 seconds

A security expert conducted a series of tests on the Fitbit trackers discovering how they can be infected with a malware in just 10 seconds. The security researcher Axelle Apvrille revealed that infect Fitbit trackers with a malware is too easy. Axelle Apvrille has managed to infect FitBit Flex fitness tracker and uses them as infection […]

Pierluigi Paganini October 19, 2015
Beware, connected ikettles can leak WiFi passwords

The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The Pen Test Partners researcher Ken Munro has conducted a very singular experiment, he mapped and hacked connected kettles across London, demonstrating they leak WiFi passwords. Once again Internet of Things, this experiment demonstrates that poorly configured […]

Pierluigi Paganini August 25, 2015
Samsung smart fridge opens Gmail login to hack

At the recent DEF CON hacking conference penetration testers demonstrated that  Samsung smart fridge leaves Gmail logins open to attack. Once again Internet of Things raises security concerns, this time security researchers have discovered a way to steal users’ Gmail credentials from a Samsung smart fridge. At the recent DEF CON hacking conference, they presented a […]

Pierluigi Paganini August 09, 2015
ZigBee-sniffing drone used to map online Internet of Things

A group of researchers launched an aerial security scanning project relying on ZigBee-sniffing drone to map online Internet of Things. Drones are powerful machines and security experts are imagining day by day new usage scenarios. A group of security experts (Paul West Jauregui, Richard McPherson, Dallas Kaman, and Nishil Shaw, partnered with Chris Eyhorn) are […]

Pierluigi Paganini August 06, 2015
Funtenna can remotely steal data from air-gapped network using sound waves

A group of researchers has presented at the Black Hat conference Funtenna, a hacking technique to steal data from air-gapped network based on sound waves. Imagine, If a remote hacker could steal classified information from a targeted computer without having to physically and Internet access to it. A team of security researchers has demonstrated how […]

Pierluigi Paganini July 09, 2015
Shodan, the Google of the Internet of Things

Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that’s why hackers love it! In 2009 John Matherly introduced the Shodan search engine, and at the time the media commented this with doubts and suspicion. Shodan indexes the information related devices exposed on the internet in the same way […]

Pierluigi Paganini June 01, 2015
How to hack a Parking Management System and why?

The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always online is inevitably exposed to the risk of cyber attacks, the security researcher Jose Guasch at the hacking conference Hack In The Box has explained that dozens of “smart” Parking Management System worldwide could be easily hacked. Guasch explained that […]