@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]
Censys is a new Search Engine for devices exposed on the Internet, it could be used by experts to assess the security they implement. Now the hackers and experts have a new powerful tool for their analysis, it is Censys, a search engine quite similar to the most popular Shodan. Censys is a free search engine that […]
According to Trend Micro up to 6.1 million smart devices, including this smart TV and routers haven’t patched a software vulnerability dating from 2012. Millions of smart TVs, routers and phones are at risk due to a presence of a 3-year-old vulnerability in a software they use. According to the experts at Trend Micro, the […]
Imperva has discovered that attackers hijack CCTV cameras to launch powerful DDoS attacks exploiting weak credentials and poor configurations of IoT devices. Internet of Things devices are becoming privilege targets of threat actors that daily abuse of their resources to run cyber attacks or to organize frauds or to spy on unaware users. Unfortunately, most IoT devices […]
The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The Pen Test Partners researcher Ken Munro has conducted a very singular experiment, he mapped and hacked connected kettles across London, demonstrating they leak WiFi passwords. Once again Internet of Things, this experiment demonstrates that poorly configured […]
A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT devices across the […]
A security expert discovered a critical flaw in the VxWorks, one of the most reliable real-time operating systems for the IoT also used by the Curiosity Rover. The Canadian security researcher Yannick Formaggio has discovered an important flaw in VxWorks which is the real-time operating system (RTOS) developed by the Wind River, an Intel’s subsidiary. VxWorks is one […]
Researchers have created an app that follows the micro-movements of your smartwatch and are able to detect what keys you’re pressing with your left hand and thus guess what words you may be typing on a keyboard. A group of students lead by Romit Roy Choudhury, Associate Professor at ECE Illinois developed a mobile app […]
Fiat Chrysler has recalled nearly 8,000 Jeep Renegade SUVs in the US to update the software that could be exploited by attackers to hack the vehicles. No peace for Fiat Chrysler Automobiles after the disclosure of the attack against its Jeep Cherokee model made by the popular hackers Charlie Miller and Chris Valasek. The duo of […]
The decision of Fiat Chrysler for providing a software update via Mailed USB is considered disconcerting for the security industry. Do you remember the hack of the Fiat Chrysler Jeep? In response to the disclosure of the details of the successful attack, the company recalled nearly 1.4 vehicles in the US in order to update the firmware running […]