Hack-tualité by G-echo - IoT, réseaux bas débit, embarqué, sécurité - Semaine 2018/50

IoT, réseaux bas débit, embarqué, sécurité - Semaine 2018/50

Kinibi TEE: Trusted Application exploitation
Tue, 11 Dec 2018 14:00:26 GMT
For a while now, Android devices and many embedded systems have used a Trusted Execution Environment (TEE) to host some security functions (like …
La 5G n’est pas encore là, mais a déjà une grosse faille de sécurité
Sat, 08 Dec 2018 10:59:13 GMT
01net
Une nouvelle attaque menée depuis une fausse station de base permet de détecter la présence d’une personne dans une zone donnée et de révéler son …
Using a Cheap USB to Serial Port Adapter as a Transmitting SDR
Fri, 07 Dec 2018 14:53:28 GMT
admin
A while ago we posted about Osmo-FL2K which is a Steve M Osmocom project that allows you to use a cheap $10 USB to VGA adapter as an HF - 1.7 GHz …
Top IoT messaging protocols are laughably insecure, Trend Micro research shows
Tue, 04 Dec 2018 21:17:06 GMT
Matthew Hughes
Japanese cybersecurity firm Trend Micro today published a report on the state of IoT security. The company found that two of the leading machine-to-machine (M2M) protocols have inherent design issues, and are frequently deployed in an insecure manner.<p>According to Trend Micro’s report, <i>The Fragility</i> …
Spoofing: RFID and SMS
Wed, 28 Nov 2018 07:49:48 GMT
Spoofing, in Simple Terms<p>First, let’s start with a definition – What is Spoofing?<br>According to ForcePoint, “Spoofing is the act of disguising a …
EU RFID & Pentesting Experts
Mon, 29 Oct 2018 00:01:58 GMT
R. L - Security Researcher
About Lab401<p>InfoSec is our career and passion, and Lab401 is a means of making hard-to-get products easily available from a trusted European source. …
IoT security: Follow these rules to protect your users from hackers, gadget makers told
Tue, 16 Oct 2018 13:44:17 GMT
Danny Palmer
New guidelines for IoT makers have been published. But will device manufacturers pay attention?<p>A government-backed scheme aims to tackle the issue of …
Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
Fri, 12 Oct 2018 05:51:57 GMT
Pierluigi Paganini
ESET researchers have spotted a new strain of malware tracked as Exaramel that links the dreaded not Petya wiper to the Industroyer ICS malware.<p>A few …
New Torii Botnet uncovered, more sophisticated than Mirai | Avast
Sat, 29 Sep 2018 21:40:31 GMT
avastblog@avast.com (Threat Intelligence Team)
<i>written by Jakub Kroustek, Vladislav Iliushin, Anna Shirokova, Jan Neduchal and Martin Hron</i>Disclaimer: Analysis of the server content and samples was …
ready open source Bluetooth Low Energy software stack to unleash IoT innovation
Wed, 19 Sep 2018 07:44:26 GMT
Arm Ltd.
Processor IP<p>Processor IP for the widest range of devices—from sensors to servers.<p>Graphics processors that offer a complete multimedia solution for …
Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack
Wed, 19 Sep 2018 07:40:21 GMT
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.<p>A security flaw in a widely used …
Hunting mobile devices endpoints - the RF and the Hard way
Tue, 18 Sep 2018 20:54:26 GMT
When conducting intrusion tests, knowledge of endpoints and exchanged data is mandatory to test targeted applications, devices, and remote servers. …
Octoprint : des milliers d’imprimantes 3D non sécurisées découvertes en ligne !
Mon, 17 Sep 2018 18:57:29 GMT
By: Sophos France
Vous avez installé au bureau une nouvelle imprimante 3D, plutôt impressionnante, et avez décidé d’y accéder à distance, car cela vous semble …
Security MadLibs: Your IoT electrical outlet can now pwn your smart TV
Mon, 17 Sep 2018 18:56:25 GMT
Shaun Nichols
McAfee finds new way to break thing that shouldn't be on your home network in the first placeA security vulnerability in "smart" power plugs can be …
Security Vulnerability in Smart Electric Outlets
Thu, 13 Sep 2018 06:19:37 GMT
Bruce Schneier
A security vulnerability in Belkin's Wemo Insight "smartplugs" allows hackers to not only take over the plug, but use it as a jumping-off point to …
La France a été la troisième région source d'attaques DDoS au 2T18 d'après un rapport, qui souligne le rôle joué par les appareils IdO non sécurisés
Thu, 13 Sep 2018 06:16:49 GMT
<b>La France a été la troisième région source d'attaques DDoS au 2T18 d'après un rapport,</b> <b><br>qui souligne le rôle joué par les appareils IdO non sécurisés</b> …
Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
Mon, 10 Sep 2018 22:34:58 GMT
Andy Greenberg
Tesla has taken plenty of innovative steps to protect the driving systems of its kitted-out cars against digital attacks. It's hired top-notch …
InternalBlue - A Deep Dive into Bluetooth Controller Firmware (mrmcd18)
Sun, 09 Sep 2018 08:53:39 GMT
The firmware of the BCM4339 Bluetooth controller (Nexus 5) and its firmware update mechanism have been reverse engineered. Based on that we developed …
Hacking The RPi Cam Web Interface
Wed, 05 Sep 2018 06:37:02 GMT
In my spare time, I like to poke around on different open and closed source projects and look for vulnerabilities. Recently, I turned my attention to …
8 technologies that an organization can adopt to help address its cybersecurity challenges
Mon, 13 Aug 2018 13:58:07 GMT
In defining policies and procedures around the implementation and management of security controls in an enterprise environment, the organization is …
Cisco Talos découvre 20 failles au sein de Samsung SmartThings Hub
Thu, 02 Aug 2018 03:03:38 GMT
Gaetan R
<i>Dans un post de blog publié le 26 juillet 2018, un chercheur de Cisco Talos explique avoir découvert 20 failles de sécurité au sein de SmartThings</i> …
The Four Types of Threat Detection With Case-Studies in Industrial Control Systems (ICS)
Wed, 01 Aug 2018 07:56:26 GMT
by Sergio Caltagirone and Robert M. Lee - July 31, 2018
Featured : Industry News<p>There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses …
Preventing IoT-Based Domestic Violence, Abuse and Stalking
Tue, 31 Jul 2018 07:22:02 GMT
Before the Internet of Things (IoT) boom, technology futurists breathlessly made predictions like, “Imagine your refrigerator can tell you when …
By G-echo

Pour aller plus loin

Ressources