Tag: internet-of-things

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • VB2016 paper: Mobile applications: a backdoor into the Internet of Things?

    The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…

  • VB2016 paper: Mobile applications: a backdoor into the Internet of Things?

    The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…

  • VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

    If you are wondering whether you really live in the future: we need to be concerned about the security of Internet-connected power outlets. Such devices are the subject of a VB2016 paper by four researchers from Bitdefender in Romania: George Cabău, Radu Basaraba, Dragoș Gavriluț and Ciprian Oprișa. While the devices may not appear to…

  • VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

    If you are wondering whether you really live in the future: we need to be concerned about the security of Internet-connected power outlets. Such devices are the subject of a VB2016 paper by four researchers from Bitdefender in Romania: George Cabău, Radu Basaraba, Dragoș Gavriluț and Ciprian Oprișa. While the devices may not appear to…

  • VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

    The recent discovery of a one-million-device IoT botnet used for DDoS attacks should be ample proof that concerns over the security of the Internet of Things are not merely theoretical. Unfortunately, the use of specific components and the wide variety among them makes reverse engineering such devices rather complicated. But it doesn’t need to be,…

  • VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

    The recent discovery of a one-million-device IoT botnet used for DDoS attacks should be ample proof that concerns over the security of the Internet of Things are not merely theoretical. Unfortunately, the use of specific components and the wide variety among them makes reverse engineering such devices rather complicated. But it doesn’t need to be,…