Internet of Things = Botnet of Things?
Just a few days ago I →
Just a few days ago I →
Google intends to buy a connected thermostat that knows when you’re home and where you are within it. Google Gets a Nest, But Is It Flying Too High? When Google closes the Nest deal, privacy issues for the internet of things will hit the big time article tells that Google rocked the smart home market →
It is expected that Internet of Things use is expanding quickly. But what about their security? I strongly encourage to read article The Internet of Things Is Wildly Insecure — And Often Unpatchable by well known security expert Bruce Schneier. It says that we’re at a crisis point now with regard to the security of →
Year 2014 will be a year of cybersecurity after the NSA revelations made in 2013: The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies. A lot of people were shocked how NSA monitored and hacked almost everything in →
I have linked to many news related to NSA spying information by Edward Snowden at Security trends for 2013 comments. He succeeded beyond anything the journalists or Snowden himself ever imagined (exploded round the world). But what do all this information really mean for you? The Guardian has a very good overview of the current →
I checked the state of this blog on the weekend. Instead of getting the usually blog content Firefox browser showed warning screen with red colors that this blog could be potentially dangerous! Safe Browsing said: ” Site is listed as suspicious , and visiting this web site may harm your computer. Part of this site →
I just saw yesterday an interesting Digital Attack Map This Live Map of Ongoing DDoS Attacks is a Digital Attack Map that was produced in a collaborative effort by Google Ideas and Arbor Networks to raise awareness about distributed denial of service attacks that try to choke or shutdown websites. Typical reasons for attacks: sites →
This week started with news titled D-Link Router backdoor vulnerability discovered and Back door found in D-Link routers. This rather worrying security vulnerability on several D-Link branded modem routers made me to check my system because I use D-Link firewall. But let’s start from the basics. Because D-Link device was on news, where is a →
Modern smartphones consume so much energy that charging them once a day is not always enough. When they are used intensively, the user sometimes has to look for a power source in the middle of the day, and charge their device whenever and wherever possible. At first glance, it seems absurd to worry about safety →
How to hack to an embedded device? On-chip debug (OCD) interfaces can provide chip-level control of a target device and are a primary vector used by engineers, researchers, and hackers to extract program code or data, modify memory contents, or affect device operation on-the-fly. Depending on the complexity of the target device, manually locating available →