Tag Archive for: Little

Hire a DDoS attack for as little as five dollars

Hire a DDoS attack for as little as five dollars

Some DDoS attacks are small, some are large, and some cost as little as five dollars…

Read more in my article on the Tripwire State of Security blog.

Graham Cluley

Devil is the details: Dirty little secrets of the Internet of Things

Where is IoT going in the long run?… To cash in on the treasure trove of “everything it knows about you,” data collected over the long term, at least it is according to a post on Medium about the “dirty little secret” of the Internet of Things.

A company can only sell so many devices, but still needs to make money, so the article suggests the “sinister” reason why companies “want to internet-connect your entire house” is to collect every little bit of data about you and turn it into profit. Although the post was likely inspired in part by the continued fallout of Nest’s decision to brick Revolv hubs, there could a IoT company eventually looking for a way to monetize on “if you listen to music while having sex.”

To read this article in full or to leave a comment, please click here

Network World Security

Vulnerabilities in industrial gas detectors require little skill to exploit

Gas detectors used in factories and other industrial settings to identify toxic conditions contain several vulnerabilities that can allow hackers to remotely sabotage the devices, according to an industry advisory published late last week.

The vulnerabilities in the Midas and Midas Black gas detectors manufactured by Honeywell can be exploited by hackers with a low skill level, according to the advisory, which was published Thursday by the Industrial Control System Cyber Emergency Response Team. The first weaknesses is a “path traversal” weakness, which allows remote attackers to bypass the normal authentication system. A second one results in the failure to encrypt user passwords when they’re being transmitted.

“Successful exploitation of these vulnerabilities could allow a remote attacker to gain unauthenticated access to the device, potentially allowing configuration changes, as well as the initiation of calibration or test processes,” the advisory warned. The notice went on to advise organizations that rely on on the detectors to install versions 1.13b3 or 2.13b3, which patch against the vulnerabilities. The advisory pointed to this link from Honeywell.

Read 1 remaining paragraphs | Comments

Ars Technica » Technology Lab

Cyber war games: A case of ‘too little too late’ – ITProPortal


ITProPortal

Cyber war games: A case of 'too little too late'
ITProPortal
At the time, the US and UK leaders placed the threat of Islamist extremists – in particular the dangers posed by cyber warfare – at the top of their agenda. The “war game” against the financial sector, which is being carried out with the co-operation

cyber warfare – read more