IoT

Pierluigi Paganini March 22, 2015
CONNECTED CARS: Which are risks for automated vehicles?

Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against hackers. “Findings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to […]

Pierluigi Paganini March 08, 2015
Hacking home networks by compromising a Nest thermostat

A group of researchers  from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers. Security experts from TrapX Security demonstrated how […]

Pierluigi Paganini February 18, 2015
Is Bio hacking a security risk? The future is now!

Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded […]

Pierluigi Paganini February 13, 2015
Discovered 40000 vulnerable MongoDB databases on the Internet

Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were exposed on the Internet. MongoDB is a cross-platform document-oriented database which uses JSON-like documents with dynamic schemas (BSON) improving the integration of data between different applications. MongoDB is very popular for scalability, performance and high availability, it represents […]

Pierluigi Paganini December 11, 2014
Smartwatch Hacked, how to access data exchanged with Smartphone

Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. […]

Pierluigi Paganini November 30, 2014
Cybercriminals are increasingly targeting web-connecting Devices including Home Appliances

 As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year.  Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. It’s the end of the year, a perfect time to look […]

Pierluigi Paganini November 04, 2014
uIP and lwIP DNS resolver exposed to cache poisoning attacks

The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported  a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]

Pierluigi Paganini October 20, 2014
Operation Distributed Dragons, thousands of machine compromised worldwide

Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian Tiger Security firm have spotted a new wave of DDoS attacks that were originated in China and that appear as run by well organized APT. The expert identified […]

Pierluigi Paganini October 17, 2014
Smart meters in Spain can be hacked to hit the National power network

Two researchers analyzed Smart meters widely used in Spain and discovered that can be hacked by attackers to harm the overall National power network. Internet of things devices are becoming a privileged target of cyber criminals, recently Akamai disclosed the existence of the Spike botnet which used by bad actors to run DDoS attacks through desktops and IoT devices. Another report issued by the same vendor […]

Pierluigi Paganini October 16, 2014
Millions vulnerable UPnP devices vulnerable to attack

Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers at Akamai firm have observed an increase of new reflection and amplification DDoS attacks exploiting Internet of Things devices (e.g. SOHO devices, routers, media servers, web cams, smart TVs and printers), which that misuses communications protocols. The […]