Singapore Authority Proposes New Guidelines to Secure Home Routers

Singapore Authority Proposes New Guidelines to Secure Home Routers

by Filip TRUTA, from IoT Security Insights , on 17.03.2020

The Infocomm Media Development Authority (IMDA), which regulates the infocomm and media sectors in Singapore, has launched a public consultation to establish security requirements for home routers sold in Singapore. Similar guidelines are being drafted by Japan and the United Kingdom. The IMDA acknowledges that the accelerating proliferation of smart, networked devices in homes, such ... The post Singapore Authority Proposes New Guidelines to Secure Home Routers appeared first on Bitdefender. read more

Researchers Send Commands to Phone Assistants Using Ultrasonic Waves through Tables

Researchers Send Commands to Phone Assistants Using Ultrasonic Waves through Tables

by Silviu STAHIE, from IoT Security Insights , on 06.03.2020

Researchers from Washington University in St. Louis found that both Android and iPhone devices are susceptible to SurfingAttack, a new technique that lets bad actors send commands using ultrasonic waves through various surfaces. Cyberaware people who worry about hackers or other security issues generally expect those disruptions to come through an online connection. But it ... The post Researchers Send Commands to Phone Assistants Using Ultrasonic Waves through Tables appeared first on Bitdefender. read more

Amazon Collects Every Last Bit of Data from the Ring Doorbell

Amazon Collects Every Last Bit of Data from the Ring Doorbell

by Silviu STAHIE, from IoT Security Insights , on 05.03.2020

Amazon collects all sorts of data from its Ring smart doorbell, including information regarding all possible interactions with the hardware and apps, a BBC investigation has revealed. The Ring doorbell has been in the news mostly for the wrong reasons. It started with Amazon’s willingness to cut deals with law enforcement agencies all over the ... The post Amazon Collects Every Last Bit of Data from the Ring Doorbell appeared first on Bitdefender. read more

Security Researchers Find Smart Camera That Really Does Suck

Security Researchers Find Smart Camera That Really Does Suck

by Silviu STAHIE, from IoT Security Insights , on 02.03.2020

Security researchers found a string of vulnerabilities in an improbable place and#8212; a smart vacuum cleaner equipped with a camera. One of the attack vectors allowed hackers to take control of the camera’s live feed. The Internet of Things (IoT) is home to all kinds of interesting devices, from regular items such as routers to ... The post Security Researchers Find Smart Camera That Really Does Suck appeared first on Bitdefender. read more

Severe Vulnerability in iBaby Monitor M6S Camera Leads to Remote Access to Video Storage Bucket

Severe Vulnerability in iBaby Monitor M6S Camera Leads to Remote Access to Video Storage Bucket

by Bitdefender Team, from Bitdefender Labs , on 25.02.2020

Baby monitors have become increasingly common in modern homes. To many parents, the ability to keep an eye on children while away is worth the risk of having video feeds or pictures leaked to unauthorized parties. This article – part of a series developed in partnership with PCMag – aims to shed light on the security of […] read more

Paradise Ransomware decryption tool

Paradise Ransomware decryption tool

by Bitdefender Team, from Bitdefender Labs , on 16.01.2020

We’re happy to announce a new decryptor for Paradise Ransomware. Paradise Ransomware, initially spotted in 2017, has been aggressively marketed as a service to interested affiliates. After infection, it checks whether the keyboard language is set to Russian, Kazakh, Belarus or Ukrainian and, if so, exits without encrypting. Otherwise, it encrypts files and deletes shadow […] read more

Seventeen Android Nasties Spotted in Google Play, Total Over 550K Downloads

Seventeen Android Nasties Spotted in Google Play, Total Over 550K Downloads

by Liviu ARSENE, from Bitdefender Labs , on 14.01.2020

Bitdefender researchers recently found 17 Google Play apps that, once installed, start hiding their presence on the user’s device and constantly display aggressive ads. While not malicious per se, the tactics they use to smuggle themselves into Google Play and dodge Google’s vetting system are traditionally associated with malware. Waiting 48 hours before hiding their […] read more

Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining

Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining

by Liviu ARSENE, from Bitdefender Labs , on 07.01.2020

The Mirai botnet that made headlines in 2016 for taking out infrastructure through large-scale network attacks has become a reference point in the security industry for the damage that large IoT botnets can inflict. Since its source code was published and made available to anyone interested in building their own botnet, many Mirai variants have […] read more

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

by Liviu ARSENE, from Bitdefender Labs , on 18.12.2019

Bitdefender researchers recently found threat actors abusing a legitimate feature in the RDP service to act as a fileless attack technique, dropping a multi-purpose off-the-shelf tool for device fingerprinting and for planting malware payloads ranging from ransomware and cryptocurrency miners to information and clipboard stealers. The attack vector involves the Windows Remote Desktop Server. The […] read more

Revisiting Glupteba: Still Relevant Five Years after Debut

Revisiting Glupteba: Still Relevant Five Years after Debut

by Bogdan BOTEZATU, from Bitdefender Labs , on 16.12.2019

In the fast-paced world of cybersecurity, malware normally gets a brief period in the spotlight before it falls into oblivion. This is not the case with Glupteba, a backdoor first spotted in 2014 that has undergone major changes to stay relevant. At the end of 2018, our Advanced Threat Control team observed a considerable wave […] read more

<< Prev Next >>