Online Security
1 view | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by carvalho.z
Scoop.it!

How To Avoid Getting Your DNS Hacked Like The New York Times - ReadWrite

How To Avoid Getting Your DNS Hacked Like The New York Times - ReadWrite | Online Security | Scoop.it
ReadWrite
How To Avoid Getting Your DNS Hacked Like The New York Times
ReadWrite
How To Avoid Getting Your DNS Hacked Like The New York Times.
carvalho.z's insight:

(Unfortunatly) following the NYT hack, these guys give us some hands on tips on how to secure our DNS. Looking forward to explore them! 

more...
No comment yet.
Rescooped by carvalho.z from Surfing the Broadband Bit Stream
Scoop.it!

Breaking And Entering: Hackers Say "Smart" Homes Are Easy Targets | SecurityLedger.com

Breaking And Entering: Hackers Say "Smart" Homes Are Easy Targets | SecurityLedger.com | Online Security | Scoop.it

In just the last two years, the price of home automation technology has come way down, while variety has exploded. Smart home technology goes way beyond niche products like the Nest IP-enabled thermostat or (save us) the “HAPIfork.” A growing list of vendors are selling infrastructure to support a whole network of intelligent “stuff”, enabling remote management of home security and surveillance systems, IP-enabled door locks, IP enabled lights, smart home appliances, HVAC (heat and cooling) and more.

 

Pretty cool. And, also, pretty scary. What if that IP-enabled door lock or garage door opener could be hacked by someone outside your home and made to open on its own? Breaking and entering just got a lot easier. Or, what if a HVAC system could be hijacked and remotely disabled or forced to operate in ways that would damage the system or even cause a fire or electrical short in the home? With control over vital systems that we all rely on, home automation systems would need to be very secure, right?

 

In theory, “yes.” In practice, “no.” That’s the conclusion of researchers who will be presenting at next week’s Black Hat Briefings. In a series of talks, researchers will demonstrate what they claim are glaring security vulnerabilities that could literally open the doors to criminals, snoops and other technically minded miscreants, the Security Ledger reports.

 

Click headline to read more--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc
more...
No comment yet.
Scooped by carvalho.z
Scoop.it!

Hacker gets access to baby monitor, says lewd things to 2-year-old ...

Hacker gets access to baby monitor, says lewd things to 2-year-old ... | Online Security | Scoop.it
Hackers are hitting us everywhere: in our bank, Twitter, and email accounts – and even at home. One Houston family's baby monitor was hacked recently.
carvalho.z's insight:

Every parent's nightmare and an example on how companies that sell home technology should pay more attention to the security of its products access from "outside" users. It's not just our webcams that can be vulnerable anymore. 

more...
No comment yet.
Scooped by carvalho.z
Scoop.it!

Network Security: How Attackers Gain Access from Inside - CircleID

Network Security: How Attackers Gain Access from Inside - CircleID | Online Security | Scoop.it
Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in.
more...
No comment yet.