Tag: hardware

D-Link celebrated a Federal Judge's determination that the FTC hadn't proven harm to consumers from security flaws in its routers and cameras, though the case is ongoing.

Court Balks at FTC’s D-Link Complaint, Wants Proof of Harm

A federal judge in California put the brakes on the U.S. Federal Trade Commission’s complaint against D-Link Systems over lax security in its consumer routers and IP cameras, saying that the Commission needs to produce evidence of concrete harm to consumers.

Repair shops for televisions and other appliances have largely disappeared in recent decades. A lack of after market parts and tools is one big reason says Kyle Wiens of Repair.org.

A Right to Repair the Internet of Things? Spear Phishing Detection and Nonstop Attacks on DVRs

In-brief: In the latest Security Ledger podcast we talk about pending right to repair laws and their impact on the Internet of Things. Also:  Facebook’s Internet Defense Prize went to a better method for spear phishing detection. We talk to a member of the winning team. And, Johannes Ullrich of The Internet Storm Center joins us to talk about a study he did to measure the frequency of attacks on a common IoT device: digital video recorders.

The Devil's Ivy flaw was discovered in security cameras made by Axis Communications, but affect a much wider population of devices. (Image courtesy of Senrio.)

Was the Devil’s Ivy Vulnerability a Dud? Don’t Count on It.

In-brief: The Devil’s Ivy vulnerability in the open source gSOAP library is widespread and supposedly trivial to exploit. So why, one month later, haven’t we seen any attacks? Is Devil’s Ivy a dud? ‘Don’t count on it,’ security experts tell us.

Fancy Bear? More like Senator Bedfellow, says Bev Harris of Black Box Voting

It’s the Corruption, Stupid: why Russians aren’t the biggest threat to Election Security

In-brief: Russian hackers aren’t the biggest threat to the security and integrity of elections says Bev Harris of Black Box Voting. Instead, it’s a more common enemy: run of the mill political corruption, mostly at the local level. Also: Eric Hodge of CyberScout talks about the challenges of helping states secure their election systems. Problem number one: recalcitrant voting machine makers. 

Miller and Valasek used a wireless hack to take control of a Jeep Cherokee, installing an image of themselves on the dashboard monitor.

Jeep Hackers Miller and Valasek Reunite at Autonomous Driving Start-up Cruise

In-brief: Security researchers Charlie Miller and Chris Valasek are re-uniting at autonomous driving start-up Cruise after both, independently leaving ride hailing firm Uber in recent months.