The approach makes Mirai executable on a wide variety of disparate IoT devices and platforms from a single server.
Link: https://threatpost.com/mirai-variant-cross-compiles-attack-code-with-aboriginal-linux/136906/
The approach makes Mirai executable on a wide variety of disparate IoT devices and platforms from a single server.
Link: https://threatpost.com/mirai-variant-cross-compiles-attack-code-with-aboriginal-linux/136906/
An unpatched buffer overflow flaw allows remote attackers to completely take over the device and enter the home network.
Link: https://threatpost.com/belkin-iot-smart-plug-flaw-allows-remote-code-execution-in-smart-homes/136732/
Bishop Fox’s Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.
Link: https://threatpost.com/video-bishop-fox-on-device-threats-and-layered-security/136716/
Misconfigured DIY smart-home hubs for home automation could allow attackers to track owners’ movements, see if smart doors and windows are opened or closed, and even open garage doors.
Link: https://threatpost.com/open-mqtt-servers-raise-physical-threats-in-smart-homes/136586/
In testing, an Internet of Things (IoT) botnet of large, power-consuming appliances was used to carry out coordinated attacks on the energy grid.
Link: https://threatpost.com/blackiot-botnet-can-water-heaters-washers-bring-down-the-power-grid/136559/
Bugcrowd’s CTO and founder Casey Ellis talked to Threatpost about the recently launched HP printer bug bounty program.
Link: https://threatpost.com/podcast-bugcrowd-founder-on-printer-bugs-iot-bounty-hunting-and-new-vdp-project/135054/
Armis’ CTO discusses the top IoT security issues in the marketplace today – and whether device manufacturers will start to prioritize security.
Link: https://threatpost.com/black-hat-exclusive-video-the-iot-security-threat-looms-for-enterprises/134991/
The Threatpost team debriefs on the top news and topics from last week’s Black Hat and DEF CON conferences.
Link: https://threatpost.com/podcast-black-hat-and-def-con-2018-wrap/135023/
A “wave of litigation over IoT liability is on the horizon," according to an attorney who has represented plaintiffs in the 2015 Jeep hack.
Link: https://threatpost.com/black-hat-2018-iot-security-issues-will-lead-to-legal-feeding-frenzy/134997/
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Link: https://threatpost.com/chris-valasek-and-charlie-miller-how-to-secure-autonomous-vehicles/134937/