Organisations are set to push ahead with increased adoption of Internet of Things devices during 2017, despite widespread concerns about the security of the products and their ability to protect the extra data they're capable of collecting.
While interest in the IoT continues to grow, concerns remain about the inherent lack of security within IoT devices vendors who continue to release products with little or no defence against cyberattacks, hacking, or being hijacked.
The figures, detailed in 451 Research's study, Voice of the Enterprise: Internet of Things (IoT) Organisational Dynamics, suggests that 71 percent of organisations are already gathering IoT data, with many set to increase their spending in the area.
A new form of Android Trojan malware is capable of attacking the routers controlling the wireless networks of its victims, thus leaving them vulnerable to further cyberattacks, fraud and data theft.
Dubbed Switcher Trojan, the malware uses unsuspecting Android device users as tools to redirect all traffic from Wi-Fi connected devices on the network into the hands of cybercriminal attackers.
The researchers at Kaspersky Lab said this is the first time Android malware has been used to attack routers like this. The malware attempts to infiltrate the router's admin interface by using a long, predefined list of password and login combinations - a task which is made easy if the router still uses easily crackable default credentials.
The thing about computer hacking is that it’s such a general, far-reaching term that it’s almost impossible to explain to someone who isn’t already familiar with it. So, news networks who need b-roll footage to show while they’re talking about hacking usually just show keyboards or random strings of letters and numbers, while the audience stares blindly at the screen, assuming that whatever they’re looking at is somehow related to the topic. Or, if you’re CNN, you steal footage from one of the most popular video games of the year and hope that nobody watching will recognize it.
Whether it was a billion compromised Yahoo accounts or state-sponsored Russian hackers muscling in on the US election, this past year saw hacks of unprecedented scale and temerity. And if history is any guide, next year should yield more of the same.
It’s hard to know for certain what lies ahead, but some themes began to present themselves toward the end of 2016 that will almost certainly continue well into next year. And the more we can anticipate them, the better we can prepare. Here’s what we think 2017 will hold.
Ever heard of a buffalo overflow? Me neither. An information security officer (ISO) mentioned it to me once, and frankly I had to Google it. Apparently it’s related to an ancient Indian technique where hunters herded bison and drove them over a cliff, breaking their legs and rendering them immobile. Tribe members waiting below closed in with spears and bows to finish the kills. That's kinda cruel to be talking about. I think the ISO meant a buffer overflow though . That I can tell a thing or two about, so in this blog I will explain how a basic buffer overflow exploitation works.
A buffer overflow is an anomaly where a program, while writing data to a buffer, overruns the buffers boundary and overwrites adjacent memory locations. Writing data outside the allocated memory space boundaries may lead to a program crash and in some cases could even give an attacker the ability to change the program application flow. In this blog I will show how a mini-application, written in C, can run arbitrary code by making use of a buffer overflow. I will use Microsoft Visual Studio 2013 to debug the application and I'll use Windows 8 as a host operation system. Please note that this blog only serves to give a basic explanation, therefore some modern protection mechanisms against buffer overflow exploitations will be disabled. This makes it somewhat easier to illustrate the basic mechanisms.
A critical remote code execution vulnerability in PHPMailer, one of the most widely used PHP email sending libraries, could put millions of websites at risk of hacking.
The flaw was found by a security researcher named Dawid Golunski and an initial fix was included in PHPMailer 5.2.18, which was released Saturday. However, it turns out that the patch was incomplete and can be bypassed.
The PHPMailer library is used directly or indirectly by many content management systems (CMSs) including WordPress, Joomla and Drupal. Where the library is not included in their core code, it is likely available as a separate module or can be bundled with third-party add-ons.