The FBI says that BADBOX 2.0 is a malware campaign that has infected over a million home Internet-connected devices. Once infected it becomes part of hacker’s attack army. It is commonly found in Chinese smart TVs (where most of them are made) and also on streaming boxes, projectors, tablets and even your smart dishwasher. Even […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am guessing that this is just the tip of the iceberg. That by itself is scary. Researchers discovered nearly 35,000 solar power systems from 42 vendors that have exposed management interfaces. This includes devices like power inverters, data loggers, monitors, etc. The researchers found nearly 50 vulnerabilities that could be exploited. Most of these […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
TLS Certificate Lifetimes Will Officially Reduce to 47 Days If you are responsible for a website, this applies to you. TLS certificates, the tech behind making HTTPS:// work on your website, has been changing over the years. A website owner used to be able to buy a certificate and it would be valid for 10 years. But […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have seen multiple attacks in the last few years on municipal water supplies. The good news is that none of them killed anyone. Mostly, that was just because we were lucky. A bug in a TLS certificate (used to implement HTTPS) allowed researchers to view the water system control panel in hundreds of public […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Fake Social Security Emails Trick Users into Installing Remote Access SW Cybersecurity experts have uncovered ongoing schemes where criminals are exploiting the US Social Security Administration (SSA) to trick people into installing a dangerous Remote Access Trojan (RAT). This program gives the attackers complete remote control, allowing them to steal personal information and install more […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CISA issued guidance this week to reduce cyber risk. The guidance is very simple: DOES THIS HAVE TO BE OPEN TO THE INTERNET? Of course, you have to know where all of your assets are. This includes by IT and OT (Internet of Things and Industrial Internet of Things) devices. Here are CISA’s yardsticks to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]