Testing for vulnerable IoT devices

Brian Krebs has lately been writing a lot about DVRs and cameras made by XiongMai Technologies. He reports that they are terribly insecure and many have been hacked and herded into botnets where they participate in Distributed Denial of Service (DDoS) attacks such as the one that brought down his site.Poor security is standard practice with IoT, but these devices are especially bad. Even if their web interface is used to change the default password, the devices have hard coded Telnet and SSH passwords that can not be changed. Part of yesterdays DDoS attack against DYN came from the Mirai botnet, composed of assorted hacked devices that were using default passwords.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3134092/networking/testing-for-vulnerable-iot-devices.html#tk.rss_all

Original article

Dyn Statement on 10/21/2016 DDoS Attack

It’s likely that at this point you’ve seen some of the many news accounts of the Distributed Denial of Service (DDoS) attack Dyn sustained against our Managed DNS infrastructure this past Friday, October 21. We’d like to take this opportunity to share additional details and context regarding the attack. At the time of this writing, we are carefully monitoring for any additional attacks. Please note that our investigation regarding root cause continues and will be the topic of future updates. It is worth noting that we are unlikely to share all details of the attack and our mitigation efforts to preserve future defenses.
I also don’t want to get too far into this post without:
Acknowledging the tremendous efforts of Dyn’s operations and support teams in doing battle with what’s likely to be seen as an historic attack.
Acknowledging the tremendous support of Dyn’s customers, many of whom reached out to support our


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/8_H6CR7mBc4/dyn-statement-on-10-21-2016-ddos-attack

Original article

How we built a Smart Office system based on Raspberry Pi

Last year, when Monterail decided to change their office to be a bigger and better-designed place , they decided that it should also be smarter. I was introduced to the team as a person who could make this happen. I collaborated with Monterail during the renovation of their new home and then finally joined the team. Such a huge project cannot start without a good, long workshop about our needs and requirements. After a thorough workshop we decided to have the following features: light control, conference and call room occupancy signalization, individual access codes for the main doors for each team member in a centralized database, audio system with a wireless music streaming option, separate, manageable audio experience in the restroom, five TVs with the ability to manage the content displayed on them, kitchen LED lamp color management, ability to control everything via a web application (desktop, mobile, phone and


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/iStkDRPw4Cc/

Original article

Serious Dirty COW bug leaves millions of Linux users vulnerable to attack

A vulnerability discovered in the Linux kernel has been present for nine years, and users are being advised to seek out and install a patch as soon as they possibly can. Dubbed Dirty COW, the bug is a privilege escalation vulnerability which can be found in just about every Linux distro out there. Discovered by security expert Phil Oester, Dirty COW is described as one of the most serious bugs of its type ever found in Linux. Assigned the code CVE-2016-5195, there is evidence that the vulnerability has been exploited and a website set up to alert people to the… [Continue Reading]


Original URL: http://feeds.betanews.com/~r/bn/~3/Nm8PCzynKKM/

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: