Have you ever experienced being hacked in your Android smartphones and tablets? How do you feel? If you have already …
Prerequisites of IoT Security: Software, Network, Physical
IoT Security focuses on protecting networks and connected devices in the Internet of Things. For the readers who are new …
Several Gas Station Design Flaws Allows Attackers to Change the Price and Take Full Control on the Gas Station Remotely
The Executive Committee of the Mediterranean Association of ICT Experts (ASPERTIC), meeting at its winter assembly in Barcelona on 16 …
Mirai Based Botnet “OMG” Turns IoT Device into a Proxy Server
A new Variant called “OMG” currently evolving to abuse the IoT Devices and turns it into a Proxy server by …
DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits
IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete …
Globally Gas Stations are Extremely Vulnerable to Internet of Things (“IoT”) Cyber Attacks
2018 begins with the rise of the Internet of Things (” IoT “) which is based on the existence of …
Most Important Consideration for Industrial Control System(ICS) Cyber Defense
It is Extremely challenging task to identify and successfully deploy an absolutely innovative and never-seen-before defense solution for Industrial Control …
Critical BlueBorne Vulnerability Impacts Around 20 Million Google Home and Amazon Echo Devices
Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short-range connectivity in the vast …
Beware – Dangerous IoT Attacks Leads Some One to Hack and Control Your Car
The Internet of Things (IoT), responsible for connecting unthinkable things, now offers the possibility of connecting vehicles to the internet. …
Metasploit Can Be Directly Used For Hardware Penetration Testing Now
Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate …