home gateway

Viewing Data From Smart TVs Used to Push Ads to All Your Screens

In-brief: Electronics maker Vizio is the latest smart television brand caught harvesting the viewing habits of its customers and selling the data to advertisers, highlighting legal loopholes that connected devices are exploiting.

Under The Hood: Wireless Software Links Teslas, Drones

In-brief: The same wireless software that powers a consumer quadcopter is also under the hood of Tesla’s Model S, according to a leading security expert – underscoring the increasingly long and complex software supply chain for connected products.

Realtors, OTA Publish Provisioning Checklist for Smart Homes

In-brief: smart homes aren’t just sold – they must also be ‘de-provisioned’ by the seller and ‘re-provisioned’ by the buyer. The National Association of Realtors and the Online Trust Alliance have a new checklist for doing so.

Closed Circuit Cameras, NAS Devices Enrolled in Botnet

In-brief: A network of 900 Closed Circuit Cameras were involved in a denial of service attack against a cloud-based service said the firm Imperva*.

Vigilante botnet highlights woeful state of embedded device security

A mysterious piece of software, dubbed Wifatch, has been infecting tens of thousands of Linux-based home routers and, according to experts at Symantec, attempts to secure them from attack. But Wifatch’s benevolent intentions shouldn’t obscure its malicious actions, or the security problems that it takes advantage of. The malicious software runs on vulnerable, Linux-based home routers. There, it removes other malware infections, disables vulnerable services like Telnet and even prompts users to update their administrator user name and password to prevent compromise, according to a post on Symantec’s blog. But the malware is still spreading between vulnerable systems without the owners consent and could easily be pressed into service distributing spam or malicious software, experts note. According to Symantec, Wifatch is likely spreading between infected devices by targeting exposed Telnet interfaces and using brute force password attacks to gain access to the devices. Tens of thousands of devices may have been infected […]