Smart Grid Attack Scenarios
This is the third (and last) in a series of posts looking at the threats surrounding smart grids and smart meters. In the first post, we introduced smart meters, smart grids, and showed why these can...
View ArticleThe Role of Smartphones in the Internet of Everything
Ever since the mobile boom, smartphones have become an integral part of our lives, enough that they’ve become virtually indispensable in today’s fast-paced world. Not only do they serve to connect us...
View ArticleDEF CON 22 Turns up the Heat on Devices
One resounding – but unsurprising – message from this year’s DEF CON conference in Las Vegas, Nevada was the increase in hacks against IoT devices. The lineup of hacked IoT devices was extensive. Many...
View ArticleWearing Your Tech on Your Sleeve
Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see...
View ArticleThe Administrator of Things (AoT) – A Side Effect of Smartification
In an earlier article, we talked about the ongoing smartification of the home – the natural tendency of households to accumulate more intelligent devices over time. While this has its benefits, the...
View ArticleThe Security Implications of Wearables, Part 1
The Internet of Everything (also known as Internet of Things) has given rise to new gadget categories in every electronics retailer shop. Smart wearables are rapidly becoming more commonplace than you...
View ArticleThe Security Implications of Wearables, Part 2
In the previous post, we talked about the definition and categories of wearables. We will now focus our attention at possible attacks for such devices. The possibility of attacks varies largely,...
View ArticleThe Security Implications of Wearables, Part 3
In the second post of this series, we discussed the first two types of attacks involving wearables. We will now proceed to the third type of attack, which can be considered the most damaging of the...
View ArticleRisky Links: Layers and Protocols of Internet of Everything Devices
We see the ‘cool’ when we wear or operate our smart TVs and watches and all other smart devices we own. But are we aware of how the data is processed in these devices? And where does the data we get or...
View ArticleIs Your Data Safe In The Internet of Everything?
I prefer using the phrase “Internet of Everything” when discussing what most people call the Internet of Things because in many ways, the latter term isn’t enough. What makes the Internet of Everything...
View ArticleSandworm to Blacken: The SCADA Connection
On October 14th, a report was publicly released regarding the Sandworm team. After beginning an investigation into the affiliated malware samples and domains, we quickly came to realization that this...
View ArticleSmart Lock Devices: Security Risks and Opportunities
Security is one of the top concerns when consumers consider buying smart devices. With cybercrime making the headlines every day, one has to think: is this smart device vulnerable to cyber attacks? Are...
View Article2015 Predictions: The Invisible Becomes Visible
2014 brought with it many significant additions to the technology landscape. These put new capabilities into the hands of users and companies that allowed them to do things that they would not have...
View ArticleBASHLITE Affects Devices Running on BusyBox
When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how...
View ArticleSecurity of Home Surveillance Cameras
Home surveillance/security cameras have been available for quite some time, and can be used to keep track of one’s home, children, pets, or business. These devices are, in some ways, the first...
View ArticleAutomotive Security: Connected Cars Taking the Fast Lane
Hearing about vulnerabilities in your car’s operating system might seem strange. But it’s now something we all need to get used to. Last January 30, several security loopholes in BMW’s ConnectedDrive...
View ArticleIs Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?
With analysis and research by Stephen Hilt (Independent Researcher) Even as attacks on SCADA devices has become more public, devices are constantly being reported as Internet-facing and thus,...
View Article
More Pages to Explore .....