article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries analyzed Date range of data: 2003-03-24 to 2019-01-24 (varies by vendor, most up to 2018 releases). [.]. They look at the actual firmware. Vendors are Asus, Belkin, DLink, Linksys, Moxa, Tenda, Trendnet, and Ubiquiti.

IoT 208
article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

Hong Kong, 16.11.2018 – Group-IB, an international company that specializes in preventing cyber attacks, presented the findings of its latest Hi-Tech Crime Trends 2018 report at the FinTech Security Conference in Hong Kong organized by Binary Solutions Limited in partnership with Group-IB. Attacks on Crypto. Group-IB in Asia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Too much UPnP-enabled connected devices still vulnerable to cyber attacks

Security Affairs

” In April 2018, Akamai reported that threat actors compromised 65,000 home routers by exploiting vulnerabilities in Universal Plug’N’Play (UPnP) , experts tracked the botnet as UPnProxy. In December 2018 the company provided an update to its initial analysis revealing a disconcerting scenario, UPnProxy is still up and running.

article thumbnail

StripedFly: Perennially flying under the radar

SecureList

This archive is discreetly hosted on legitimate websites, cleverly disguised as firmware binaries for enigmatic devices labeled “m100” The Bitbucket repository was created on June 21, 2018, under the account of Julie Heilman, and it remains the sole repository associated with this profile. onion ghtyqipha6mcwxiz[.]onion

Malware 114
article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

Firmware signing is also key to ensuring that devices can verify the authenticity and integrity of updates and security patches that eliminate discovered vulnerabilities. Finally, it is difficult to underemphasise the importance of encryption to protect sensitive data collected by IoT devices.

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

Imagine the “smart factory” of the future offering real time data collection, predictive insight into machine maintenance or even remote factory monitoring for updates and disruptions. The proliferation of connected devices offers enormous business benefit, across industries as diverse as manufacturing, healthcare and automotive.

IoT 97