Efficient IoT Security Practices

The Internet has become the primary channel for communication and networking, making the global business community more accessible worldwide. Companies, as well as members of the public, increasingly rely upon this enhanced connectivity for day-to-day tasks and many other factors of daily life. In recent years this concept has evolved to include connectivity from a wide range of devices; giving …

Backspace: Linux Hacking Made Easy

A potentially disturbing bug has surfaced within certain Linux operating systems, which allows anyone full access to your password protected machine with very little effort. Discovered by a team of two security research professionals from the University of Valencia, the ‘hack’ involves simply pressing the backspace button 28 times during grub username authentication.  This bizarre bug is found in Grub2 …

Problematic: The Hackers Search Engine

It turns out that a new hackers search engine is on the rise, a major cause for concern where all Internet users are concerned. The hackers search engine, Censys, completes daily scans to find vulnerable devices, and lists their details. This information, quite naturally, is readily available to any hacker who wants it. The rather unfortunate truth is that several manufacturers …

Hacking Children’s Toys a Possibility

In yet another uncomfortable technological twist, it turns out that hacking children’s toys may be the spy tools of the not-too-distant future. PCs, mobile phones, Smart devices, messaging services… it seems as though absolutely no device is safe. Hacking children’s toys, however, may be a touch too far for some. Unfortunately, the Investigatory Powers Bill dictates that Smart toys can and possibly …

A Massive Cyber Security Threat

Today’s business world relies heavily upon data security for almost every industry imaginable. While there are many excellent and reliable systems to protect your company’s data, there remains a critical weakness in every organization: the unpredictability of employees. This cyber security threat is possibly the most potent of them all. There are of course, various reasons why an employee with …

6.1 Million IoT Devices Vulnerable

As it turns out, a three-year-old security vulnerability found within 6.1 Million IoT devices still remains unpatched by many vendors, placing Smart TVs, Routers, Smartphones, and similar mobile devices at risk of malicious attack. One would assume that any flaw found within the software components of so many products would be patched within a relatively short period of time, rather than stretching out over several years. Security …

Dell Laptops are Infected with Malware

In a recent post on The Hacker News, readers are alerted to the fact that newer Dell laptops are infected with malware. This particular malware is similar to the  so-called “Superfish” malware that infested Lenovo laptops in February this year. Dell’s latest PCs and laptops appear to have rogue SSL-certificates installed. These would allow attackers to pose as any HTTPS website and …