Remove DNS Remove Firmware Remove IoT Remove Mobile
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Now for the big challenge - security. Let's dive into it.

IoT 358
article thumbnail

Unfixed vulnerability in popular library puts IoT products at risk

Malwarebytes

Researchers have found a vulnerability in a popular C standard library in IoT products that could allow attackers to perform DNS poisoning attacks against a target device. Because uClibc is a relatively small C standard library intended for Linux kernel-based operating systems for embedded systems and mobile devices.

IoT 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking the Twinkly IoT Christmas lights

Security Affairs

Security researchers discovered some flaws in the Twinkly IoT lights that could be exploited display custom lighting effects and to remotely turn off them. Twinkly smart decoration could be controlled via a mobile app, the experts focused their tests on the communication. ” reads the analysis published by MWR InfoSecurity.

IoT 82
article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

Expanding attack surfaces require additional skills to secure, maintain, and monitor an ever-expanding environment of assets such as mobile, cloud, and the internet of things (IoT). assets (endpoints, servers, IoT, routers, etc.), and installed software (operating systems, applications, firmware, etc.).

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Malicious mobile app. Always change the default passwords for any IoT devices you install before extended use. However, a growing number of botnet attacks are used against IoT devices and their connected networks. ” Malicious Mobile Apps. How to Defend Against a Malicious Mobile App. Jump ahead: Adware.

Malware 105
article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

For improved security using mobile phones, free authentication apps are available from Google, Microsoft, and others. Similarly, spoofed domain name system (DNS) and IP addresses can redirect users from legitimate connections to dangerous and malicious websites. connections to IoT, OT, and rogue wi-fi routers.

Firewall 109
article thumbnail

10 Network Security Threats Everyone Should Know

eSecurity Planet

DNS attacks : DNS cache poisoning, or hijacking, redirects a legitimate site’s DNS address and takes users to a malicious site when they attempt to navigate to that webpage. This includes IoT devices. Sooner rather than later, you’ll want to perform an audit of your OT and IoT devices. Segmentation.