Vulnerabilities

McAfee Researchers Exploit Smart Plug to attack Smart TV!

Researchers from McAfee have demonstrated how a flaw in a Belkin smart switch can be used to access other connected devices on the same network as the switch. 

Cisco Links Remote Access Tool Remcos to Cybercriminal Underground

Questions are being raised about whether remote-access and testing tools from a mysterious company called Breaking Security are made and sold by cyber criminals, after the tools have been widely adopted as a turnkey solution for setting up and running botnets, according to Cisco Talos.

Episode 108: DEF CON’s Car Hacking Village and is the Open Source Model Failing on Security

In this week’s podcast (#108), sponsored by CA Veracode: hacker summer camp wrapped up on Sunday, as the 26th annual DEF CON conference concluded at Caesar’s Palace in Las Vegas. Hacks of connected and smart vehicles were a big theme again this year. We sat down with the organizers of DEF CON’s Car Hacking Village to see what was news at this year’s show.  Also: open source software has revolutionized the way software gets made, and turbo charged the growth of companies like Facebook and Uber. But is the open source model failing us when it comes to security? We’re joined by OWASP founder Mark Curphey of CA Veracode to discuss it.

Report: Firms Could Use Better Vulnerability Assessment to Fight Cyberthreats

Half of organizations are relative teenagers in terms of maturity when it comes to their vulnerability-assessment practices, a key aspect of successful strategies to defend themselves quickly against cyber attacks, a recent report has found.

Exploits in Samsung Hub Put Smart Homes at Risk

There is more alarming security news for consumers with smart devices at home: hackers can take remote control of video cameras, thermostats, smart locks or other IoT devices by exploiting vulnerabilities discovered in Samsung’s SmartThings Hub, according to a report by Cisco Systems’ Talos research group.