article thumbnail

Unraveling the truth behind the DDoS attack from electric toothbrushes

Security Affairs

Several media reported that three million electric toothbrushes were compromised and recruited into a DDoS botnet. The Swiss newspaper Aargauer Zeitung first published the news of a DDoS attack, carried out on January 30, that involved three million compromised electric toothbrushes. Is it true? What the f is wrong with you people????

DDOS 107
article thumbnail

DDoS Attacks Skyrocket, Kaspersky Researchers Say

eSecurity Planet

Distributed denial of service (DDoS) attacks soared in the third quarter, giving organizations yet another cyber threat to worry about. Even the slowest days saw 500 DDoS attacks; the busiest day, Aug. Also read: How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks. See our picks for Top DDoS Products.

DDOS 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

For any IoT device vendors currently contracted by the government, this is what we know so far from the National Institute of Standards and Technology (NIST): Required reading for IoT manufacturers: foundational guidelines about IoT vulnerabilities ( 8259 ) and a core baseline of necessary cybersecurity components ( 8259A ). Data protection.

IoT 144
article thumbnail

Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

eSecurity Planet

In a recent blog post , the researchers said the bad actors are looking to leverage a path traversal vulnerability that could affect millions of home routers and other Internet of Things (IoT) devices that use the same code base and are manufactured by at least 17 vendors. ” Multiple Threats. A Pattern of Exploits.

IoT 144
article thumbnail

Cyber Best Practices for Overseas Asset Security

SecureWorld News

Cyber challenges facing businesses expanding overseas Companies expanding into overseas markets face amplified cyber security challenges. Cyber espionage by nation-state actors is very common for foreign firms to experience. So, how exactly are these challenges exacerbated when moving your operations beyond borders?

article thumbnail

Spotlight Podcast: Intel’s Matt Areno – Supply Chain is the New Security Battlefield

The Security Ledger

In this Spotlight Podcast, sponsored by The Trusted Computing Group, we speak with Matthew Areno, a Principal Engineer in the Intel Product Assurance and Security (IPAS) group about the fast-changing landscape of cyber threats including attacks on hardware and software supply chains.

article thumbnail

Future Attacks Against Cyber Connected Cars

SecureWorld News

Researchers studied 29 real-world scenarios based on the DREAD threat model for qualitative risk analysis. Here are three things the report highlights: "DDoS attacks on Intelligent Transportation Systems (ITS) could overwhelm connected car communications and represent a high risk. Canadian auto industry behind on cyber threats.