IoT

Most Important Cybersecurity Risk Mitigating for Connected VehiclesMost Important Cybersecurity Risk Mitigating for Connected Vehicles

Most Important Cybersecurity Risk Mitigating for Connected Vehicles

Staying connected when managing or owning a fleet is crucial. It is the only way to have real-time data and…

7 years ago
Globally Gas Stations are Extremely Vulnerable to Internet of Things (“IoT”) Cyber AttacksGlobally Gas Stations are Extremely Vulnerable to Internet of Things (“IoT”) Cyber Attacks

Globally Gas Stations are Extremely Vulnerable to Internet of Things (“IoT”) Cyber Attacks

2018 begins with the rise of the Internet of Things (" IoT ") which is based on the existence of…

7 years ago
HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims NetworksHNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as  CVE-2016-10401 to propagate malicious code and steal the…

7 years ago
Most Important Consideration for Industrial Control System(ICS) Cyber DefenseMost Important Consideration for Industrial Control System(ICS) Cyber Defense

Most Important Consideration for Industrial Control System(ICS) Cyber Defense

It is Extremely challenging task to identify and successfully deploy an absolutely innovative and never-seen-before defense solution for Industrial Control…

7 years ago
Key Ways to Stop Hackers From Invading Your Smart HomeKey Ways to Stop Hackers From Invading Your Smart Home

Key Ways to Stop Hackers From Invading Your Smart Home

If you’re like millions of other people around the world, you have at least one, if not many, smart home…

7 years ago
100 Million IoT Smart Devices are Vulnerable to Z-Wave Wireless Communications Protocol Downgrade Attack100 Million IoT Smart Devices are Vulnerable to Z-Wave Wireless Communications Protocol Downgrade Attack

100 Million IoT Smart Devices are Vulnerable to Z-Wave Wireless Communications Protocol Downgrade Attack

Z-Wave, a Wireless Communication Protocol that widely used in IoT Smart Devices vulnerability allow attackers to perform Downgrade Attack and…

7 years ago
Researchers Use Machine Learning to Create Real-time IoT DDoS Detection Tool to Block Attack Traffic from IoT BotnetsResearchers Use Machine Learning to Create Real-time IoT DDoS Detection Tool to Block Attack Traffic from IoT Botnets

Researchers Use Machine Learning to Create Real-time IoT DDoS Detection Tool to Block Attack Traffic from IoT Botnets

Researchers using Machine learning as a new technique to create a Real-Time Internet of Things(IoT) DDoS detection tool to prevent…

7 years ago
Mirai Based Botnet “OMG” Turns IoT Device into a Proxy ServerMirai Based Botnet “OMG” Turns IoT Device into a Proxy Server

Mirai Based Botnet “OMG” Turns IoT Device into a Proxy Server

A new Variant called "OMG" currently evolving to abuse the IoT Devices and turns it into a Proxy server by…

7 years ago
DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor ExploitsDoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits

DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits

IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete…

7 years ago
Critical BlueBorne Vulnerability Impacts Around 20 Million Google Home and Amazon Echo DevicesCritical BlueBorne Vulnerability Impacts Around 20 Million Google Home and Amazon Echo Devices

Critical BlueBorne Vulnerability Impacts Around 20 Million Google Home and Amazon Echo Devices

Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short-range connectivity in the vast…

7 years ago