KREUZADER (Posts tagged internet of things)

1.5M ratings
277k ratings

See, that’s what the app is perfect for.

Sounds perfect Wahhhh, I don’t wanna
Bruce Schneier: ‘The internet era of fun and games is over’“Internet pioneer Bruce Schneier issued a dire proclamation in front of the House of Representatives’ Energy & Commerce Committee Wednesday: “It might be that the internet era of fun and...

Bruce Schneier: ‘The internet era of fun and games is over’

Internet pioneer Bruce Schneier issued a dire proclamation in front of the House of Representatives’ Energy & Commerce Committee Wednesday: “It might be that the internet era of fun and games is over, because the internet is now dangerous.”

[…]

“As the chairman pointed out, there are now computers in everything. But I want to suggest another way of thinking about it in that everything is now a computer: This is not a phone. It’s a computer that makes phone calls. A refrigerator is a computer that keeps things cold. ATM machine is a computer with money inside. Your car is not a mechanical device with a computer. It’s a computer with four wheels and an engine… And this is the Internet of Things, and this is what caused the DDoS attack we’re talking about.“

Source: dailydot.com
bruce schneier internet internet of things security cybersecurity

See full details at: http://iotworm.eyalro.net

[…]

We have installed several Philips Hue lights in one floor to test our attack.

We have mounted our attack kit on a drone and started our attack from a range of 350 meters

When the drone hovers in front of the building, the second phase of our attack can be seen. The lights have been “kidnaped” [sic] from their controller and are crying for help, signaling S O S repeatedly in Morse code.

drone security internet of things cyberpunk
Hacked Cameras, DVRs Powered Today’s Massive Internet Outage
“A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT)...

Hacked Cameras, DVRs Powered Today’s Massive Internet Outage

A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.

Earlier today cyber criminals began training their attack cannons on Dyn, an Internet infrastructure company that provides critical technology services to some of the Internet’s top destinations. The attack began creating problems for Internet users reaching an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.

[…]

It’s unclear what it will take to get a handle on the security problems introduced by millions of insecure IoT devices that are ripe for being abused in these sorts of assaults.

Source: krebsonsecurity.com
internet internet of things security cybersecurity

The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

image

Originally posted by strictlysubtitles

internet of things security

Google’s own negotiations with consumer electronics manufacturers could be hampered by what multiple sources have described as overly aggressive muscle-flexing. At the meeting in June, Google is said to have told home audio vendors that they won’t be allowed to add any other digital assistants than Google’s own to their hardware if they want to continue to use Google Cast. Another source told Variety of similarly far-reaching demands made in negotiations with another big consumer electronics manufacturer — demands that ultimately led to talks breaking down.

google amazon internet of things
“I’m in London for Kubecon right now, and the hotel I’m staying at has decided that light switches are unfashionable and replaced them with a series of Android tablets.
One was embedded in the wall, but the two next to the bed had convenient looking...

I’m in London for Kubecon right now, and the hotel I’m staying at has decided that light switches are unfashionable and replaced them with a series of Android tablets.

One was embedded in the wall, but the two next to the bed had convenient looking ethernet cables plugged into the wall. So I managed to borrow a couple of USB ethernet adapters, set up a transparent bridge (brctl addbr br0; brctl addif br0 enp0s20f0u1; brctl addif br0 enp0s20f0u2; ifconfig br0 up) and then stuck my laptop between the tablet and the wall. tcpdump -i br0 showed traffic, and wireshark revealed that it was Modbus over TCP. Modbus is a pretty trivial protocol, and notably has no authentication whatsoever. tcpdump showed that traffic was being sent to 172.16.207.14, and pymodbus let me start controlling my lights, turning the TV on and off and even making my curtains open and close. What fun!

And then I noticed something. My room number is 714. The IP address I was communicating with was 172.16.207.14. They wouldn’t, would they?

I mean yes obviously they would.

internet of things security