Devices News, Articles and Updates

Cellebrite reportedly can unlock every iPhone Model

Israel-based Cellebrite reportedly privately announced the capability to subvert the security of iOS 11 enabled devices including the latest iPhone, iPad, iPad mini, iPad Pro and iPod touch.

France mulls manufacturer liability & open-sourcing, IoT industry on edge

The French government has floated a proposal to make manufacturers of internet-connected devices liable for the security of their devices while they are on the market.

Interpol warns IoT devices at risk

Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device - from refrigerators to smartphones - is vulnerable to attack.

Drive-by cryptomining targeting millions of Android devices

Drive-by cryptomining campaigns were spotted targeting millions of Android devices via infected apps and malicious browser redirects.

ADB.Miner takes cryptominer mobile and beyond targeting Android devices

Malicious cryptominers are going mobile and beyond with a new botnet malware targeting Android-based devices that expose debug capabilities to the internet, for the purpose or mining Monero.

Amazon issues security patch for Key after researcher claims hack

Amazon is issuing a security patch for its "Key"services shortly after a researcher posted a video demonstration of them claiming to hack the Amazon device using a Raspberry Pi.

JenX botnet using video game to recruit IoT devices

Security researchers have found a new botnet that uses flaws connected to the Satori botnet and uses hosting services running multiplayer versions of Grand Theft Auto to infect IoT devices.

Autosploit marries Shodan, Metasploit, puts IoT devices at risk

Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices.

Satori creator linked with new Mirai variant Masuta

Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may also be behind two new Mirai variants called Masuta and PureMasuta.

Hide 'N Seek IoT botnet caught using Peer-to-Peer communication

An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.

Not-so-super Sonic? Sega apps leak data to suspicious servers

Three Sonic the Hedgehog games for Android devices that collectively have been downloaded well over a hundred million times are leaking users' geolocation and device data to uncertified servers.

Meltdown, Spectre updates aplenty, but the fix is more complicated

A pair of flaws dubbed Meltdown and Spectre that take advantage of the speculative execution performance feature in modern CPUs make the memory of virtually all computers and devices accessible to hackers.

Malware behind Satori botnet posted to Pastebin

The code that exploits a flaw in Huawei, a router that enables these devices to be turned into botnets to push Satori and Brickerbot has been publicly posted on Pastebin.

Three critical steps businesses can take today to defend their networks against IoTroop

Unlike Mirai, the IoTroop bot exploits nine core vulnerabilities as it spreads, and already, experts say those responsible for the bot - who remain unknown - have added more than 100 features to it.

Android Flaw could enable hackers to modify code without signature change

A serious vulnerability in Android could put millions of devices at risk from attackers modifying code in applications without affecting their signatures.

Data breach concerns cause fear around device disposal

Seven in ten people in the UK are being put off recycling old and unused electrical products because of concerns about personal security data breaches.

Rémy Cointreau Case Study - connecting a global workforce to the cloud

Rémy Cointreau faced a challenge to create a more agile organisation through its IT infrastructure, providing employees with the ability to securely access applications from any device at any time and from anywhere.

Updated with response: Brother printers & devices vulnerable to DoS attack

Trustwave researchers revealed a vulnerability in Brother consumer and business printers and multi-function devices that can allow a denial of service attack. Brother UK responds.

LG patches app bug that can turn IoT vacuums into robotic spies

LG patches holes in its IOT device range following cooperation with CheckPoint, including patching vacuum cleaners which could have become digital spies in the home.

Multiple vulnerabilities found in connected IoT home security device

Popular IoT home security device could allow hackers to turn burglar alarms on and off and switch on siren, says researcher who dissected it.

Netflix unveils open source user device security tool

Actionable information and low-friction tools for users can get devices into a more secure state without heavy-handed policy enforcement.

Lost devices leading cause of data breaches, report

Phishing scams and ransomware attacks may be grabbing the headlines, but for the financial sector lost or stolen mobile devices were the leading cause of data breaches over the last decade.

FIC 2016: Is security the main challenge of the Internet of Everything?

Christophe Jolly of Cisco France took the stage at FIC 2016 to outline the fundamental security problems in the looming "internet of everything".

Slush Helsinki: IoT security on the rise, physical security becoming more prevalent

As this year's Slush conference opens, securing The Internet of Things has become a hot topic with many of the exhibiting companies tackling the issue head on.

Why the ICO's BYOD guidance may translate to 'bring your own data breach'

When the UK's Data Protection Act (DPA) was instigated in 1998 almost all data was generated, consumed and stored on company owned and managed equipment.

Department for Business, Innovation and Skills report loss of over 100 devices

The department for Business, Innovation and Skills (BIS) has lost 83 smartphones and 17 laptops over the past five years.

RSA Conference: Age of internet of things is upon us

The challenge of hyper-connected devices and the 'internet of things' will see billions of devices connected by the end of this decade, and all need to be secured.