Remove 2009 Remove IoT Remove Manufacturing
article thumbnail

Easily Exploitable Linux Flaw Exposes All Distributions: Qualys

eSecurity Planet

The vulnerability, tracked as CVE-2021-4034 , has “been hiding in plain sight” for more than 12 years and infects all versions of polkit’s pkexec since it was first developed in 2009, Bharat Jogi, director of vulnerability and threat research at Qualys, wrote in a blog post.

article thumbnail

4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device

Security Affairs

The gateway device connects bedside equipment (anesthesia and infusion pumps, respirators and IoT products) to the network. An attacker that is able to compromise a vulnerable device like a home router could use it as an entry point in a target network and hack other devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. John Johnson is cybersecurity leader for a large consumer manufacturing company. Click here to see the full list of 2021 SC Award finalists.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

China has been taking methodical steps to transform itself from the source of low-end manufactured goods to the premier supplier of high-end products and services. From a security standpoint, the rising prominence of mobile computing, the cloud and IoT translate into new tiers piled on top of an already vast threat landscape.

IoT 171
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? Turns out they weren't.

article thumbnail

Building the Ultimate Home Office (Again)

Troy Hunt

I'm happy mucking around with things like IoT all day long but that's not critical to me getting work done! The image earlier on of my 2009 setup had 2 x 24" Samsung screens on them running 1920 x 1200 each. Also, by being IoT enabled I can do a heap of other things with them using Home Assistant (another massive rabbit hole).

IoT 364