Bugcrowd Paid Over $500,000 in Bug Bounties in Just One Week Bugcrowd, the crowd-sourced bug bounty management company, paid out over $500,000 in just one week for bugs that researchers found and paid out $1.6 million in October to over 550 hackers, representing 1,800 submissions. Of those, 327 were categorized as priority 1. These payouts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No, not literally, but close. Researchers investigated 81 Internet of Things (IoT) devices like smart TVs or security cameras. The researchers ran 34,000+ experiments and found that 72 of those devices contacted someone other than the manufacturer. For example, almost all of the TVs contacted Netflix, even if you don’t have a Netflix account. For […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Internet of Things (IoT) and the Industrial version (IIot) are kind of like the wild west at the moment. People and businesses are deploying IoT and IIoT devices at an incredible rate. Estimates are that there will be tens of billions of them deployed over the next few years. But that doesn’t help the security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to a report released by cloud security vendor Zscaler, 91% of the traffic that they saw coming through their network security devices from IoT “things” was NOT encrypted. This is on enterprise networks where one might think that security is more important, so maybe the number is even higher on home networks, although it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
With the government doing just about zero when it comes to protecting you from Internet of Things security hacks, this leaves the entire burden on you. A hacker broke into two different GPS tracker apps – he hacked about 7,000 iTrack accounts and 20,000 ProTrack accounts. In general hacking into someone’s web account might cost […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at Ben Gurion University in Israel created malware that could infect a CT scanner and cause it to provide either false positive or false negative readings. The researchers took real CT lung scans and let their malware modify the scans. In the cases where the researchers created fake cancerous nodes, the radiologists who read […]
Continue reading →
[DISPLAY_ACURAX_ICONS]