Post Tagged with: "password"

Password Shaming: SCADA Password Dump Intended to Improve Security

January 7, 2016 11:482 comments
Password Shaming: SCADA Password Dump Intended to Improve Security

In-brief: Call it “password shaming”: a group of security researchers has published a list of default administrator credentials for the software that runs many of the world’s industrial facilities and manufacturing lines. 

Read more ›

Report: Newly Discovered GlassRAT Lurked For Years, Undetected

November 23, 2015 19:470 comments
RSA Security said a newly discovered Trojan horse program may have been lurking for three years on corporate networks. Chinese nationals were the apparent target.

In-brief: RSA Security said a newly discovered Trojan horse program may have been lurking for three years on corporate networks. Chinese nationals were the apparent target.

Read more ›

Security Holes in Power Analyzers More Bad News for Industry

October 27, 2015 12:360 comments
Easily exploitable security holes in power analyzer devices by a German firm could impact a wide range of industries, a new report finds.

In-brief: Software security holes in widely used industrial equipment known as “power quality analysers” (sp) could enable remote attackers to disrupt or corrupt operations at firms across industries, according to a report released by the firm Applied Risk. 

Read more ›

Vigilante botnet highlights woeful state of embedded device security

October 5, 2015 12:07Comments Off on Vigilante botnet highlights woeful state of embedded device security
A scatter plot diagram of compromised home routers.

A mysterious piece of software, dubbed Wifatch, has been infecting tens of thousands of Linux-based home routers and, according to experts at Symantec, attempts to secure them from attack. But Wifatch’s benevolent intentions shouldn’t obscure its malicious actions, or the security problems that it takes advantage of. The malicious software runs on vulnerable, Linux-based home routers. There, it removes other malware infections, disables vulnerable services like Telnet and even prompts users to update their administrator user name and password to prevent compromise, according to a post on Symantec’s blog. But the malware is still spreading between vulnerable systems without the owners consent and could easily be pressed into service distributing spam or malicious software, experts note. According to Symantec, Wifatch is likely spreading between infected devices by targeting exposed Telnet interfaces and using brute force password attacks to gain access to the devices. Tens of thousands of devices may have been infected […]

Read more ›
%d bloggers like this: