embedded device

Under The Hood: Wireless Software Links Teslas, Drones

In-brief: The same wireless software that powers a consumer quadcopter is also under the hood of Tesla’s Model S, according to a leading security expert – underscoring the increasingly long and complex software supply chain for connected products.

Closed Circuit Cameras, NAS Devices Enrolled in Botnet

In-brief: A network of 900 Closed Circuit Cameras were involved in a denial of service attack against a cloud-based service said the firm Imperva*.

Vigilante botnet highlights woeful state of embedded device security

A mysterious piece of software, dubbed Wifatch, has been infecting tens of thousands of Linux-based home routers and, according to experts at Symantec, attempts to secure them from attack. But Wifatch’s benevolent intentions shouldn’t obscure its malicious actions, or the security problems that it takes advantage of. The malicious software runs on vulnerable, Linux-based home routers. There, it removes other malware infections, disables vulnerable services like Telnet and even prompts users to update their administrator user name and password to prevent compromise, according to a post on Symantec’s blog. But the malware is still spreading between vulnerable systems without the owners consent and could easily be pressed into service distributing spam or malicious software, experts note. According to Symantec, Wifatch is likely spreading between infected devices by targeting exposed Telnet interfaces and using brute force password attacks to gain access to the devices. Tens of thousands of devices may have been infected […]

Epidemic: Researchers Find Thousands of Medical Systems Exposed to Hackers

In-brief: Thousands of clinical systems are exposed to remote attacks according to researchers, who say that poorly designed and loosely configured medical devices are a major source of insecurity. 

The Internet of Things is entering a Post-Recall Reality

In-brief: Security, personal safety, privacy and policy are converging in what might be called a “post recall reality” for the Internet of Things. How to respond will be a key issue as top researchers and policymakers gather in Cambridge next week for The Security of Things Forum.