• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Critical RCE can allow attackers to compromise Juniper Networks devices
  • Russia-linked APT SVR actively targets these 5 flaws
  • Mirai code re-use in Gafgyt
  • Lazarus BTC Changer. Back in action with JS sniffers redesigned to steal crypto
  • US Gov sanctions Russia and expels 10 diplomats over SolarWinds hack
  • Cyber thieves move $760 million stolen in the 2016 Bitfinex heist
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Internet of Things (Page 27)

Internet of Things

Car Hacking – Chinese hacker team remotely hacked Tesla Model S

A group of security researchers from the Chinese firm Tencent have found a series of flaws that can be exploited to remotely hack a Tesla Model S. Security experts at the Keen Lab at Chinese firm Tencent have found a series of vulnerabilities that can be exploited...

September 20, 2016  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

Linux/Mirai ELF, when malware is recycled could be still dangerous

Experts from MalwareMustDie spotted a new ELF trojan backdoor, dubbed ELF Linux/Mirai,  which is now targeting IoT devices. Experts from MalwareMustDie have analyzed in August samples of a particular ELF trojan backdoor, dubbed ELF Linux/Mirai,  which...

September 5, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Internet of Things  Malware 

BASHLITE Botnets peaked 1 Million Internet of Thing Devices

A joint research conducted by Level 3 Communications and Flashpoint allowed the identification of a million devices infected by the BASHLITE malware. Do you remember the BASHLITE malware? It was a strain of malware (also known as Lizkebab, Torlus and Gafgyt)...

September 1, 2016  By Pierluigi Paganini   Posted In  Breaking News  Internet of Things  Malware 

Linux.PNScan Trojan is back to compromise routers and install backdoors

The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors on them. Yesterday I wrote about a new Linux Trojan dubbed Linux.Rex.1, a new Linux malware that is capable of self-spreading...

August 25, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Internet of Things  Malware 

IoT – Shocking : How your home sockets could aid in Cyber attacks

IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I love some of the gangster nicknames people come up with. Knuckles, Fat Tony , Stab Happy or even Bambi. Names are characteristic...

August 23, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Internet of Things 

Top Security Priorities of the Internet of Things

The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution. Technology firms are now linking objects ranging from household appliances to industrial machinery to the internet. With telecommunications...

August 5, 2016  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Internet of Things 

Sucuri spotted a large botnet of CCTV devices involved in DDoS attacks

Security experts from Sucuri firm have discovered a large botnet of compromised CCTV devices used by crooks to launch DDoS attacks in the wild. Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected...

June 28, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Internet of Things 

Watch out, FLocker Ransomware targets Android smart TVs

The day has come, Sharp and Philips smart TV running the Android TV OS could be infected by a ransomware dubbed FLocker ransomware. When a journalist asked me which is a possible evolution of ransomware I had no doubt, the Internet of Things. I was thinking...

June 14, 2016  By Pierluigi Paganini   Posted In  Breaking News  Internet of Things  Malware 

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to the Internet of Things paradigm,...

June 13, 2016  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Intelligence  Internet of Things 

So You want to Capitalize on the IoT Business…

The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. It’s a buzzword that has been around the past decade and has often been portrayed in futuristic visions of a society...

June 8, 2016  By Pierluigi Paganini   Posted In  Breaking News  Internet of Things  Security 


« First‹ Previous232425262728Next ›
Page 27 of 28



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT