Remove Information Security Remove InfoSec Remove Internet Remove IoT
article thumbnail

DEFCON 29 IoT Village – Juneau’s ‘Strategic Trust And Deception In The Internet Of Things’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEF CON 29 IoT Village videos on the Conferences’ YouTube channel. The post DEFCON 29 IoT Village – Juneau’s ‘Strategic Trust And Deception In The Internet Of Things’ appeared first on Security Boulevard.

IoT 64
article thumbnail

ISO/IEC 27400 IoT security and privacy standard published

Notice Bored

To celebrate the publication of ISO/IEC 27400:2022 today, we have slashed the price for our IoT security policy templates to just $10 each through SecAware.com. IoT policy is the first of the basic security controls shown on the 'risk-control spectrum' diagram above, and is Control-01 in the new standard.

IoT 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking IoT & RF Devices with BürtleinaBoard

Security Affairs

How to hack IoT & RF Devices with BürtleinaBoard. Few months ago I have presented #FocacciaBoard : a similar multipurpose breakout board that uses the famous FT232H to handle multiple protocols commonly found in (I)IoT devices (i.e. The post Hacking IoT & RF Devices with BürtleinaBoard appeared first on Security Affairs.

IoT 134
article thumbnail

Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked online

Security Affairs

The availability online of a new collection of Telnet credentials for more than 500,000 servers, routers, and IoT devices made the headlines. The list appears to be the result of an Internet scan for devices using default credentials or easy-to-guess passwords. 33000+ telnet credentials of IoT devices exposed on pastebin.

IoT 96
article thumbnail

Hackers Could Cause ‘Fake Earthquakes’ by Exploiting Vulnerable Seismic Equipment, Researchers Warn

Hot for Security

Seismic monitoring equipment is vulnerable to common cybersecurity threats like those faced by IoT devices, a new research paper warns. Non-encrypted data, insecure protocols and poor user authentication mechanisms are among the security issues that leave seismological networks open to breaches, the authors note.

IoT 128
article thumbnail

BSides Tallinn’s ‘Best Of BSides 2021’: BSides Berlin 2021 – Aditya K. Sood’s ‘(Internet Of Things Or Threats) Anatomizing The Structure Of IoT Botnets’

Security Boulevard

Sood’s ‘(Internet Of Things Or Threats) Anatomizing The Structure Of IoT Botnets’ appeared first on Security Boulevard. Our thanks to BSides Tallinn for publishing their outstanding choices of the Best of BSides 2021 videos on the Conferences’ YouTube channel.

IoT 40
article thumbnail

Domotics - a can-o-worms

Notice Bored

This morning, I’ve been browsing and thinking about ISO/IEC 27403 , a draft ISO27k standard on the infosec and privacy aspects of “domotics” i.e. IoT things at home. IoT things are generally just black-boxes. Security configuration is, at best, an ad hoc activity when (some) things turn up.

IoT 63