Tag: hardware

IOActive researchers extracted firmware from the Linksys smart wifi router and discovered 10 security vulnerabilities. (Photo courtesy of IOActive.)

Bot Fodder: 20 Models of Linksys Routers Vulnerable to remote Hacks

In-brief: serious security flaws affect 20 models of wireless routers manufactured by the firm Linksys, just the latest report to underscore security flaws in ubiquitous networking hardware that is used by homes and small businesses, the firm IOActive disclosed on Thursday.

Most U.S. adults had trouble identifying key cyber security concepts including what data was secure online and the definition of a botnet.

DHS warns of BrickerBot Threat to Internet of Things

In-brief: the Department of Homeland Security is warning about destructive attacks by BrickerBot, a new piece of malicious software that attacks Linux devices and renders them useless, wiping out critical configuration information and data from the devices. 

A report from the firm FireEye warns that industrial firms still have work to do securing their environments from cyber attacks.

Seven Years After Stuxnet, Industrial Firms Still Lag on Security

In-brief: Seven years after the Stuxnet worm proved that attacks on industrial environments was possible, many industrial and manufacturing firms still lack basic elements of an effective information security strategy, a new report finds. 

A flaw in Broadcom WiFi system on chip (SOC) components affects many different types of phones.

WiFi Chip Flaw in iPhone is Really Bad News for IoT

In-brief: a remotely exploitable flaw in a common hardware component used in phones by Apple, Samsung and others underscores the risk posed by software embedded in system on chip components that are found in almost every connected device, experts warn. 

The FBI is warning medical and dental offices to be on the lookout for insecure FTP servers.

FBI Warns Medical Offices: Exposed FTP Servers are a Target

In-brief: The FBI is telling medical and dental offices to lock down anyFile Transfer Protocol (FTP) servers in their environments, warning that cyber criminals are searching for exposed FTP servers as a pathway to sensitive networks and protected health information (PHI).