Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- Angry Man on Windows 11 24H2: Activation lost?
- Anonymous on Windows: Microsoft's Bing wallpaper app as "adware"?
- EP on Browser trouble II: Nov. 2024 updates for Server 2008/R2 bricks older browsers
- NB on Windows Server 2012 R2 is EOL; ESU license not for on-premises systems?
- Crystal on Free vSphere Hypervisor (ESXi 7.x and 8.x) End of General Availability
Recent Comments
- Angry Man on Windows 11 24H2: Activation lost?
- Anonymous on Windows: Microsoft's Bing wallpaper app as "adware"?
- EP on Browser trouble II: Nov. 2024 updates for Server 2008/R2 bricks older browsers
- NB on Windows Server 2012 R2 is EOL; ESU license not for on-premises systems?
- Crystal on Free vSphere Hypervisor (ESXi 7.x and 8.x) End of General Availability
Tag Archives: IoT
Vulnerabilities in Realtek SDK put IoT devices at risk
[German]Security researchers at IoT Inspector have found multiple vulnerabilities in a Realtek SDK that allow unauthenticated attackers to fully compromise a device and execute arbitrary code with the highest privileges. The SDK is used by many OEMs to implement WiFi … Continue reading
Do IoT devices with built-in "radio chips" endanger IT security?
[German]Interesting aspect I stumbled upon recently. It's about the question of how Internet of Things (IoT) devices threaten IT security. Because in addition to often serious vulnerabilities in their firmware as well as lack of updates after a short time, … Continue reading
BadAlloc: Critical bugs found in IoT devices and in OT systems
[German]Microsoft security researchers have taken a closer look at Internet of Things (IoT) software used in devices and operational technology (OT) industrial systems. In the process, they have come across more than two dozen critical remote code execution vulnerabilities. The … Continue reading
Digital doorbells for consumer and its security
[German]In the consumer sector, intelligent doorbell cameras have been davertised and have also been bought heavily. Now someone has taken a closer look at some of these "doorbells" from security aspects … and found the expected results.
Amnesia:33 – Vulnerability in TCP/IP stack put many IoT devices at risk
[German]Security researchers have found 33 vulnerabilities in open source implementations of the TCP/IP stack. These endanger the device security of around 150 manufacturers. This applies to all devices connected to the Internet and ranges from medical devices to many IoT … Continue reading
Outsch: Cellmate 'chastity lock cock-up' hackable – forever locked …
[German]A story that brings tears to your eyes. Security researchers have discovered that the Cellmate chastity lock for men is hackable. It can be closed by hackers forever, no way back. Eh man, have a bolt cutter…
Bug in Thales modules endangers security of millions of connected devices
[German]A vulnerability in Thales modules threatens the security of millions of critical, interconnected devices in the automotive, energy, telecommunications and medical sectors. It allows hackers to hijack the device or access the internal network. In some cases, the vulnerability can … Continue reading
Millions of IoT devices easily hackable
[German]Unpleasant, but not surprising, findings from the Def Con 2020: the vast majority of Internet of Things (IoT) devices are open like a hole and easily hackable. Only idiots, naive people, and hasaders use such devices with (unsecured) access from … Continue reading
Expired certificates kick IoT devices out of business
[German]Now a view at the 'bitter end of smart devices' such as smart TVs, refrigerators or other IoT devices (smart speakers, thermostats, etc.) becomes visible. There are not even missing updates for their software. Expired security certificates could kick those … Continue reading
Vulnerability in Amazon’s Ring doorbell
[German]IoT security experts from BullGuard and Dojo have uncovered a previously unknown vulnerability in the networked video doorbell of the Amazon subsidiary Ring: audio and/or video material was transmitted unencrypted to the ring app and was therefore vulnerable to external … Continue reading