article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

“These vulnerabilities could impact access to a vehicle fuel supply, vehicle control, or allow locational surveillance of vehicles in which the device is installed.” CVE-2022-2141 (CVSS score: 9.8) – Improper authentication allows a user to send some SMS commands to the GPS tracker without a password.

article thumbnail

Overview of IoT threats in 2023

SecureList

Attack vectors There are two main IoT infection routes: brute-forcing weak passwords and exploiting vulnerabilities in network services. A successful password cracking enables hackers to execute arbitrary commands on a device and inject malware. Unfortunately, users tend to leave these passwords unchanged.

IoT 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

Databases accumulate a vast amount of sensitive information, including passwords, trade secrets, financial and personal data. Future trends in User Activity Monitoring Today, the primary challenge in adopting employee monitoring solutions is their high cost, coupled with concerns about employee demotivation due to increased surveillance.

article thumbnail

Advanced threat predictions for 2022

SecureList

This year, the use of surveillance software developed by private vendors has come under the spotlight, as discussed above. And now, we turn our attention to the future. Here are the developments we think we could be seeing in 2022. Private sector supporting an influx of new APT players.

Mobile 138
article thumbnail

Facebook May Have Gotten Hacked, and Maybe It’s Better We Don’t Know

Adam Levin

A week after it landed with a curious (and most likely spurious) thud, Zuckerberg’s announcement about a new tack on consumer privacy still has the feel of an unexpected message from some parallel universe where surveillance (commercial and/or spycraft) isn’t the new normal.

Hacking 100
article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Whether you’re a seasoned cloud expert or just starting out, understanding IaaS security is critical for a resilient and secure cloud architecture. Physical Security Measures At their data centers, IaaS companies apply stringent physical security measures such as access restrictions, surveillance, and environmental controls.

article thumbnail

Cloud Security Fundamentals: Understanding the Basics

eSecurity Planet

Consider applying these methods for checking your security controls: Ensure physical security: Verify the data center’s security measures, such as surveillance, access controls, and the presence of security officers, to prevent unwanted access.