Hack-tualité by G-echo - IoT, réseaux bas débit, embarqué, sécurité - Semaine 2018/52

IoT, réseaux bas débit, embarqué, sécurité - Semaine 2018/52

Hazardous Voltage
Sun, 30 Dec 2018 10:13:34 GMT
276hp at 1953 bauds, communicating with the elderly<p>I moved to Japan mid-2017 and bought an old MY97 Subaru Impreza STi. While old, this car became my …
OWASP Internet of Things Project - OWASP
Sat, 29 Dec 2018 07:47:25 GMT
OWASP Internet of Things (IoT) Project<p>Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects …
Security review of LoRaWAN networks
Fri, 21 Dec 2018 20:24:22 GMT
- Introduction to LoRaWAN networks & protocol<br>- Protocol attacks<br>- Implementation weaknesses<br>- Hardware attacks on node devices
IoT et sécurité Sigfox
Sat, 29 Dec 2018 02:35:35 GMT
- Présentation de Digital Security et du CERT-UBIK<br>- Problématiques de sécurité courantes des objets connectés<br>- Présentation de la technologie Sigfox …
Kinibi TEE: Trusted Application exploitation
Tue, 11 Dec 2018 14:00:26 GMT
For a while now, Android devices and many embedded systems have used a Trusted Execution Environment (TEE) to host some security functions (like …
La 5G n’est pas encore là, mais a déjà une grosse faille de sécurité
Sat, 08 Dec 2018 10:59:13 GMT
Une nouvelle attaque menée depuis une fausse station de base permet de détecter la présence d’une personne dans une zone donnée et de révéler son …
Using a Cheap USB to Serial Port Adapter as a Transmitting SDR
Fri, 07 Dec 2018 14:53:28 GMT
A while ago we posted about Osmo-FL2K which is a Steve M Osmocom project that allows you to use a cheap $10 USB to VGA adapter as an HF - 1.7 GHz …
Top IoT messaging protocols are laughably insecure, Trend Micro research shows
Tue, 04 Dec 2018 21:17:06 GMT
Matthew Hughes
Japanese cybersecurity firm Trend Micro today published a report on the state of IoT security. The company found that two of the leading machine-to-machine (M2M) protocols have inherent design issues, and are frequently deployed in an insecure manner.<p>According to Trend Micro’s report, <i>The Fragility</i> …
Spoofing: RFID and SMS
Wed, 28 Nov 2018 07:49:48 GMT
Spoofing, in Simple Terms<p>First, let’s start with a definition – What is Spoofing?<br>According to ForcePoint, “Spoofing is the act of disguising a …
EU RFID & Pentesting Experts
Mon, 29 Oct 2018 00:01:58 GMT
R. L - Security Researcher
About Lab401<p>InfoSec is our career and passion, and Lab401 is a means of making hard-to-get products easily available from a trusted European source. …
IoT security: Follow these rules to protect your users from hackers, gadget makers told
Tue, 16 Oct 2018 13:44:17 GMT
Danny Palmer
New guidelines for IoT makers have been published. But will device manufacturers pay attention?<p>A government-backed scheme aims to tackle the issue of …
Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
Fri, 12 Oct 2018 05:51:57 GMT
Pierluigi Paganini
ESET researchers have spotted a new strain of malware tracked as Exaramel that links the dreaded not Petya wiper to the Industroyer ICS malware.<p>A few …
New Torii Botnet uncovered, more sophisticated than Mirai | Avast
Sat, 29 Sep 2018 21:40:31 GMT
avastblog@avast.com (Threat Intelligence Team)
<i>written by Jakub Kroustek, Vladislav Iliushin, Anna Shirokova, Jan Neduchal and Martin Hron</i>Disclaimer: Analysis of the server content and samples was …
ready open source Bluetooth Low Energy software stack to unleash IoT innovation
Wed, 19 Sep 2018 07:44:26 GMT
Arm Ltd.
Processor IP<p>Processor IP for the widest range of devices—from sensors to servers.<p>Graphics processors that offer a complete multimedia solution for …
Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack
Wed, 19 Sep 2018 07:40:21 GMT
Jai Vijayan Freelance writer
Zero-day flaw in China-based NUUO's video recorder technology still unfixed three months after vendor was alerted.
Hunting mobile devices endpoints - the RF and the Hard way
Tue, 18 Sep 2018 20:54:26 GMT
When conducting intrusion tests, knowledge of endpoints and exchanged data is mandatory to test targeted applications, devices, and remote servers. …
Octoprint : des milliers d’imprimantes 3D non sécurisées découvertes en ligne !
Mon, 17 Sep 2018 18:57:29 GMT
By: Sophos France
Vous avez installé au bureau une nouvelle imprimante 3D, plutôt impressionnante, et avez décidé d’y accéder à distance, car cela vous semble …
Security MadLibs: Your IoT electrical outlet can now pwn your smart TV
Mon, 17 Sep 2018 18:56:25 GMT
Shaun Nichols
McAfee finds new way to break thing that shouldn't be on your home network in the first placeA security vulnerability in "smart" power plugs can be …
Security Vulnerability in Smart Electric Outlets
Thu, 13 Sep 2018 06:19:37 GMT
Bruce Schneier
A security vulnerability in Belkin's Wemo Insight "smartplugs" allows hackers to not only take over the plug, but use it as a jumping-off point to …
La France a été la troisième région source d'attaques DDoS au 2T18 d'après un rapport, qui souligne le rôle joué par les appareils IdO non sécurisés
Thu, 13 Sep 2018 06:16:49 GMT
<b>La France a été la troisième région source d'attaques DDoS au 2T18 d'après un rapport,</b> <b><br>qui souligne le rôle joué par les appareils IdO non sécurisés</b> …
Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
Mon, 10 Sep 2018 22:34:58 GMT
Andy Greenberg
Tesla has taken plenty of innovative steps to protect the driving systems of its kitted-out cars against digital attacks. It's hired top-notch …
By G-echo