Tag: iot

  • VB2019 paper: Medical IoT for diabetes and cybercrime

    It is estimated that between 8% and 9% of the population worldwide suffers with some form of diabetes. People with type 1 diabetes typically have to measure their blood glucose levels several times a day and adjust their treatment according to the results. Traditionally, this has been done by means of the person pricking their…

  • VB2018 paper: Hide’n’Seek: an adaptive peer-to-peer IoT botnet

    Until recently IoT botnets mostly consisted of Mirai and its many descendants. However, during 2018 we have seen an increase in the variety of botnets living on the Internet of Things. One prime example is Hide’N’Seek, discovered by Bitdefender in January, which is notable for its use of peer-to-peer for command-and-control communication. Though the botnet’s…

  • VB2018 paper: Hide’n’Seek: an adaptive peer-to-peer IoT botnet

    Until recently IoT botnets mostly consisted of Mirai and its many descendants. However, during 2018 we have seen an increase in the variety of botnets living on the Internet of Things. One prime example is Hide’N’Seek, discovered by Bitdefender in January, which is notable for its use of peer-to-peer for command-and-control communication. Though the botnet’s…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • Hide’n’Seek IoT botnet adds persistence

    The Hide’n’Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart, Bitdefender reports . Though persistence is fairly common for traditional botnets that target ( Windows ) PCs, a device that is part of a botnet targeting the Internet of Things (IoT) can often be ‘cleaned’ simply…

  • Hide’n’Seek IoT botnet adds persistence

    The Hide’n’Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart, Bitdefender reports . Though persistence is fairly common for traditional botnets that target ( Windows ) PCs, a device that is part of a botnet targeting the Internet of Things (IoT) can often be ‘cleaned’ simply…

  • Security-focused routers may help to mitigate IoT threats

    Walking around the RSA show floor last week, it was clear that the Internet of Things, or IoT, is a hot topic in security. Indeed, the number of connected devices continues to grow and new IoT botnets continue to be discovered, with Saikin and Hajime being two of the most recent examples. It is important…