According to recent research, there are many common office devices that are major hacking targets. In the past decade, printers have become more high-tech with Web, email, and WiFi capabilities, without the security to protect them from unwanted attacks. According to the Technology Review,Read More
Wired's Threat Level blog recently reported on a demonstration by German researchers of vulnerabilities in common GSM phones that, when exploited--using what the researchers refer to as the "SMS of Death," a maliciously coded text message--could not only shut a phone out of its network, rendering it unusable, but if launched on a large scale could potentially shut down entire networks.Read More
At the Black Hat conference in Las Vegas this month, a group of highly accomplished hackers-turned-security researchers will converge to show off their latest discoveries and to share their findings with the development community. Among them will be Craig Heffner, who plans to unveil a flaw in consumer routers that could expose ‘millions’ of home networks to hackers.
“The sleight of hand discovered by Heffner involves establishing an attack site which runs malicious script that means a visitor's own IP address is presented as one of the site's alternative IP addresses, thereby granting a trusted status to a malign site. Modern browsers are designed to block earlier types of such attacks but not with this particular scenario, for reasons Heffner is due to explain at Black Hat.”
Present in a variety of router models by companies such as Linksys, Belkin and Dell, the flaw is a vulnerability to a classic hacking technique called DNS rebinding, in which hackers use malicious code to “trick” a device into controlling it. While Heffner’s discussion will hopefully include preventative measures for the manufacturers of these routers, there is currently a list of vulnerable kits and sensible workarounds to address this flaw at Notebooks.com.Read More
As smartphones continue to proliferate on networks around the world, they are increasingly under attack from malware and other malicious code. And because anti-virus solutions originally developed for desktops do not adapt well to the data and power constraints of mobile devices, new approaches to device security are needed to protect the growing smartphone category.Read More
Despite their ubiquity, security and networking technologies for sensors and other smart objects are still very much in their infancy, and there is tremendous technical and market opportunity in this arena. With major computational and communication resource constraints, these networks require new security solutions developed from the ground-up, as integral parts of their architectures.Read More