Remove the-internet-of-things-is-a-complete-mess-and-how-to-fix-it
article thumbnail

The Internet of Things is a Complete Mess (and how to Fix it)

Troy Hunt

Plus, it's definitely added to our lives in terms of the things it enables us to do; see them in part 5 of my IoT unravelled blog series. But it also remains a complete mess and I want to demonstrate why based on some recent experiences: Let's say you want an IoT light. With a different app.

Internet 359
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. I've been directly involved in the discovery or disclosure of a heap of these and indeed, security is normally the thing I most commonly write about. Let's dive into it.

IoT 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Fuzzing makes it possible to locate vulnerabilities even in “safe” environments like Erlang, a language designed for high availability and robust services. The flaw was discovered and reported directly to the administrators of Log4j, widely used open source tool, who then patched it. The trouble is, details of this leaked prematurely.

article thumbnail

Common vulnerabilities in Java and how to fix them

Security Boulevard

Securing applications is not the easiest thing to do. The first step to fixing vulnerabilities in your application is to know what to look for. Today, let’s take a look at 30 of the most common vulnerabilities that affect Java applications, and how you can find and prevent them. Photo by Cookie the Pom on Unsplash.

article thumbnail

Padlocks, Phishing and Privacy; The Value Proposition of a VPN

Troy Hunt

I want a "secure by default" internet with all the things encrypted all the time such that people can move freely between networks without ever needing to care about who manages them or what they're doing with them. I mean what's the remaining gap? In the end I broke it down into 3 Ps: padlocks, phishing and privacy.

VPN 358
article thumbnail

Vulnerability Management as a Service: Top VMaaS Providers

eSecurity Planet

There are 20,000 or more new software and hardware vulnerabilities every year, yet only a few hundred might be actively exploited. It falls to IT security teams to determine where those vulnerabilities lie in their organization and which ones they need to prioritize. That process can be overwhelming. What are the Main Steps Involved in VMaaS?

Software 111
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

The reliability is provided by the presence of a turing complete “scripting” inside a music player. I’ve got a lot of experience participating in so-called “co-ordinated disclosure”, where the receiving vendor takes as long as they wish to fix a vulnerability. x player for NSF music files. More on that below. We’ll cover why below.

Banking 139