According to recent research, there are many common office devices that are major hacking targets. In the past decade, printers have become more high-tech with Web, email, and WiFi capabilities, without the security to protect them from unwanted attacks. According to the Technology Review,Read More >
Wired's Threat Level blog recently reported on a demonstration by German researchers of vulnerabilities in common GSM phones that, when exploited--using what the researchers refer to as the "SMS of Death," a maliciously coded text message--could not only shut a phone out of its network, rendering it unusable, but if launched on a large scale could potentially shut down entire networks.Read More >
At the Black Hat conference in Las Vegas this month, a group of highly accomplished hackers-turned-security researchers will converge to show off their latest discoveries and to share their findings with the development community. Among them will be Craig Heffner, who plans to unveil a flaw in consumer routers that could expose ‘millions’ of home networks to hackers.
“The sleight of hand discovered by Heffner involves establishing an attack site which runs malicious script that means a visitor's own IP address is presented as one of the site's alternative IP addresses, thereby granting a trusted status to a malign site. Modern browsers are designed to block earlier types of such attacks but not with this particular scenario, for reasons Heffner is due to explain at Black Hat.”
Present in a variety of router models by companies such as Linksys, Belkin and Dell, the flaw is a vulnerability to a classic hacking technique called DNS rebinding, in which hackers use malicious code to “trick” a device into controlling it. While Heffner’s discussion will hopefully include preventative measures for the manufacturers of these routers, there is currently a list of vulnerable kits and sensible workarounds to address this flaw at Notebooks.com.Read More >
As smartphones continue to proliferate on networks around the world, they are increasingly under attack from malware and other malicious code. And because anti-virus solutions originally developed for desktops do not adapt well to the data and power constraints of mobile devices, new approaches to device security are needed to protect the growing smartphone category.Read More >
Despite their ubiquity, security and networking technologies for sensors and other smart objects are still very much in their infancy, and there is tremendous technical and market opportunity in this arena. With major computational and communication resource constraints, these networks require new security solutions developed from the ground-up, as integral parts of their architectures.Read More >
Read More >
"The virus attacked the non-secured internal French navy network called Intramar and was detected on 21 January. The whole network was affected and military staff were instructed not to start their computers. According to Liberation newspaper, two days later the chiefs of staff decided to isolate Intramar from the military's other computer systems, but certain computers at the Villacoublay air base and in the 8th Transmissions Regiment were infected. Liberation reported that on the 15 and 16 January the Navy's Rafale aircraft were "nailed to the ground" because they were unable to "download their flight plans". The aircraft were eventually activated by "another system".
The IPSO Alliance is a group of leading technology vendors and users which promotes the use of Internet Protocol (IP) for connecting 'smart' objects and delivering information to and from those objects. 'Smart objects' include just about anything that is network addressable and can deliver state, sensor or processor data, including consumer devices like cellphones and GPS receivers, as well as the manufacturing automation infrastructure devices that form the bedrock of the modern economy, like sensors, actuators, process controllers and assembly line robotics.Read More >