Security Alerts & News
by Tymoteusz A. Góral

History
#1580 IoT devices as proxies for cybercrime
Multiple stories published here over the past few weeks have examined the disruptive power of hacked “Internet of Things” (IoT) devices such as routers, IP cameras and digital video recorders. This post looks at how crooks are using hacked IoT devices as proxies to hide their true location online as they engage in a variety of other types of cybercriminal activity — from frequenting underground forums to credit card and tax refund fraud.

Recently, I heard from a cybersecurity researcher who’d created a virtual “honeypot” environment designed to simulate hackable IoT devices. The source, who asked to remain anonymous, said his honeypot soon began seeing traffic destined for Asus and Linksys routers running default credentials. When he examined what that traffic was designed to do, he found his honeypot systems were being told to download a piece of malware from a destination on the Web.
Read more
#1588 Android devices that contain Foxconn firmware may have a secret backdoor
#1587 Evernote confirms a serious bug caused data loss for some Mac users
#1586 Almost 6,000 online shops hit by hackers
#1585 Cisco patches critical bug in video conferencing server hardware
#1584 Beware of the student loan forgiveness scam spam
#1583 Google plugs 21 security holes in Chrome
#1582 Operations of a Brazilian payment card fraud group
#1581 Amazon resets customer passwords, while LeakedSource discloses massive update
#1580 IoT devices as proxies for cybercrime
#1579 A SSHowDowN in security: IoT devices enslaved through 12 year old flaw
#1578 Feds strike another multi-national “tech support” scam
#1577 Fighting the person should be cybersecurity best practice: Nuix
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12