Mr.Trunk · @mrtrunk
12 followers · 19256 posts · Server dromedary.seedoubleyou.me

SecurityWeek: Norfolk Southern Says a Software Defect — Not a Hacker — Forced It to Park Its Trains This Week securityweek.com/norfolk-south

#iotsecurity #railway #train

Last updated 1 year ago

Mr.Trunk · @mrtrunk
10 followers · 18502 posts · Server dromedary.seedoubleyou.me

SecurityWeek: Over $1 Million Offered at New Pwn2Own Automotive Hacking Contest securityweek.com/over-1-millio

#iotsecurity #carhacking #pwn2own

Last updated 1 year ago

Mr.Trunk · @mrtrunk
9 followers · 16021 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
7 followers · 15834 posts · Server dromedary.seedoubleyou.me

SecurityWeek: TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks securityweek.com/tp-link-smart

#iotsecurity

Last updated 1 year ago

Mr.Trunk · @mrtrunk
7 followers · 15731 posts · Server dromedary.seedoubleyou.me

SecurityWeek: TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks securityweek.com/tp-link-smart

#iotsecurity

Last updated 1 year ago

Mr.Trunk · @mrtrunk
7 followers · 15626 posts · Server dromedary.seedoubleyou.me

SecurityWeek: TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks securityweek.com/tp-link-smart

#iotsecurity

Last updated 1 year ago

AzureTracks · @azuretracks
0 followers · 38 posts · Server techhub.social

Tip: Get real-time threat intelligence and protection with Microsoft Defender for IoT. Secure your Internet of Things deployments and safeguard connected devices from evolving threats.

#iotsecurity #microsoftdefender

Last updated 1 year ago

Kevin Dominik Korte · @kdkorte
7 followers · 188 posts · Server fosstodon.org

Sometimes, cybersecurity questions seem closer to novels than real life. Utilizing millions of solar inverters to take down the power grid first appears to be James Bond-worthy in complexity. At a second glance, over-the-air updates, call-home for statistics, and lax designs make the scenario easily feasible, especially if few closed-source offerings dominate the market.

skynews.com.au/australia-news/

#iotsecurity #cybersecurity

Last updated 1 year ago

Mr.Trunk · @mrtrunk
5 followers · 10421 posts · Server dromedary.seedoubleyou.me
Peter J. Welcher · @pjwelcher
65 followers · 59 posts · Server techfieldday.net

Fresh blog post: “Elisity Zero Trust (ZTNA) Is Hot!” Overview of Elisity’s innovative approach to simpler campus security netcraftsmen.com/elisity-zero-

#elisity #ztna #Security #medicaliotsecurity #iotsecurity

Last updated 1 year ago

Mr.Trunk · @mrtrunk
4 followers · 4983 posts · Server dromedary.seedoubleyou.me

SecurityWeek: White House Unveils Cybersecurity Labeling Program for Smart Devices securityweek.com/white-house-u

#iotsecurity #government

Last updated 1 year ago

Thomas Traynor · @thomastraynor
49 followers · 3300 posts · Server social.linux.pizza

I hope they also have alternate methods than just the QR code. Nothing will stop scammers forging the QR code or hijack existing QR codes for a similar product. However, it is a start as too many IoT devices are not secure and no way to make them secure.

techcrunch.com/2023/07/18/us-g

#iotsecurity

Last updated 1 year ago

Dis · @dis
95 followers · 489 posts · Server techhub.social

The absolute best part of the project is that I can just buy random sensors and throw them anywhere. Security is such a joke (its just broadcast) but the threat model is "someone driving past might notice that my pool is warm." 🤷 🌡️

(I do mean REALLY anywhere though, within about 4 yards in most directions, using zero equipment outside the main house. Later I'll waterproof one and try it on the fence..)

Y'all shouldn't be buying toothbrushes or really ANY bathroom scale. Just saying. (And yes, I can probably see your growroom sensor too.)

#bigear #ble #oralb #bluetooth #homeassistant #esp32 #security #iot #iotsecurity

Last updated 1 year ago

Emulating IoT Firmware Made Easy: Start Hacking Without the Physical Device

boschko.ca/qemu-emulating-firm

#pentesting #iotsecurity #infosec

Last updated 1 year ago

tecnowiz.net · @tecnowiz
1 followers · 36 posts · Server mastodon.uno
Loki the Cat · @LokiTheCat
176 followers · 913 posts · Server toot.community

Looks like my cat brethren are not the only ones who enjoy buffer overflow. Apparently, you can crash the Wemo Mini Smart Plug V2 by giving it a name longer than 30 characters. Talk about being feline frustrated! 🐾😾

it.slashdot.org/story/23/05/17

#iotsecurity #wemo #VULNERABILITY

Last updated 1 year ago

Jay Cuthrell · @jay
86 followers · 286 posts · Server cuthrell.com
IT News · @itnewsbot
3127 followers · 256958 posts · Server schleuss.online

Don’t Forget Hardware in IoT Security - It’s easy to find cybersecurity software solutions for Internet of Things (IoT) de... - readwrite.com/dont-forget-hard

#iot #hardware #security #readwrite #iotsecurity #iothardware #hardwareiscrucialforiotsafety

Last updated 2 years ago

Slim Bill (He/Him) · @wjmalik
290 followers · 1623 posts · Server noc.social

great comment from Phil Englert, Director of Medical Device Security at Health-ISAC, on Legacy device management:
When your old car leaks oil, you check the oil more often.
@TrendMicro

#iotsecurity #iomt #himms23

Last updated 2 years ago