Remove Firmware Remove Surveillance Remove Wireless
article thumbnail

Planet WGS-804HPT Industrial Switch flaws could be chained to achieve remote code execution

Security Affairs

The Planet WGS-804HPT industrial switch is used in building and home automation networks to provide connectivity of Internet of things (IoT) devices, IP surveillance cameras, and wireless LAN network applications. Planet Technology has released firmware version 1.305b241111 to address these issues. ” concludes the report.

article thumbnail

A bowl full of security problems: Examining the vulnerabilities of smart pet feeders

SecureList

The findings of the study reveal a number of serious security issues, including the use of hard-coded credentials, and an insecure firmware update process. The first time the feeder is used, the user must set up the wireless network that the feeder will use from this app. The package is a compressed archive protected by a password.

Firmware 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Click Attacks a Growing Threat

eSecurity Planet

Once the zero-click attack has successfully compromised the targeted device through a simple wireless connection such as Wi-Fi, Bluetooth, GSM, or LTE, NSO can spy on all a user’s activities, including emails, phone calls and text messages. com, with a non-standard high port number and fourth-level subdomain like [link].

Spyware 125
article thumbnail

Security experts disclosed Wyze data leak

Security Affairs

The company produces inexpensive smart home products and wireless cameras. . The incident was independently verified by the authors of the blog IPVM that focuses on video surveillance products. IoT vendor Wyze announced that one of its servers exposed the details of roughly 2.4 million customers.

IoT 96
article thumbnail

Security Affairs newsletter Round 419 by Pierluigi Paganini – International edition

Security Affairs

ransom Dragon Breath APT uses double-dip DLL sideloading strategy International Press Cybercrime San Bernardino County pays $1.1-million ransom Dragon Breath APT uses double-dip DLL sideloading strategy International Press Cybercrime San Bernardino County pays $1.1-million

article thumbnail

What Is Industrial Control System (ICS) Cyber Security?

eSecurity Planet

Industrial networks include wired and wireless technologies such as Ethernet, Modbus, and Profibus. Patch management: Keeping software and firmware up to date to close security gaps. Ransomware can cripple essential functions until a ransom is paid, while malware may lead to unauthorized control or surveillance of the system.

Firmware 109
article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

Criminals may use hijacked drones for illegal surveillance, smuggling, or even as weapons. Here are some key details: Advanced Encryption Standard (AES): AES is a widely adopted symmetric-key encryption algorithm used in many RF systems, especially in Wi-Fi and other wireless communication protocols.