7 Malware Families Ready to Ruin Your IoT’s Day

Posted on March 30th, 2019 by Responsible Cyber

This latest list of Internet of Things miscreants doesn’t limit itself to botnets, like Mirai. 1 of 8 Don’t you hate it when one loud co-worker at the office takes all the credit and keeps the rest of the team out of management’s eye? Welcome to the world of Internet of Things (IoT) malware, where […]

Read More

“Twitter 2007 multicolor” hoax – debunk it, don’t spread it!

Posted on March 28th, 2019 by Responsible Cyber

by Paul Ducklin We’ve written about internet hoaxes many times before on Naked Security. Sometimes, hoaxes – made-up nonsense about software, bugs or hackers – get spread widely because they sound exciting and scary. Even when a hoax sounds bizarre and unlikely, it may get picked up and repeated as an earnest truth by millions […]

Read More

What is shadow IoT? How to mitigate the risk

Posted on March 14th, 2019 by Responsible Cyber

Shadow IoT definition Shadow IoT refers to internet of things (IoT) devices or sensors in active use within an organization without IT’s knowledge. The best example is from before the days of bring your own device (BYOD) policies when employees used personal smartphones or other mobile devices for work purposes. “Shadow IoT is an extension […]

Read More

IoT botnets target enterprise video conferencing systems

Posted on February 20th, 2019 by Responsible Cyber

Companies have been adding internet of things (IoT) devices to their networks over the past few years, often increasing their exposure on the internet. This has led to a rise in botnets that specialize in exploiting insecure configurations and vulnerabilities to take control of network-attached storage boxes, surveillance cameras, digital video records and more recently, […]

Read More

Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products

Posted on February 15th, 2019 by Responsible Cyber

New initiative offers five principles for greater IoT security . Mozilla Foundation, the Internet Society, and eight other organizations have teamed up to push retailers to demand that Internet of Things manufacturers improve security in their devices. The initiative seeks to enlist retailers to use their greatest power — that of dropping products from distribution […]

Read More

Get a Lifetime Subscription to Unlimited VPN for just $59.99 (5 Devices)

Posted on February 14th, 2019 by Responsible Cyber

For all of the undeniable conveniences the Internet has brought us, it’s becoming an increasingly dangerous place to be.Both individual hackers and entire government agencies are now able to hack into your computer or smartphone from across the globe and steal everything from your browsing history to your credit card numbers, and they’re often able […]

Read More

What’s behind this 1,000-character phishing URL?

Posted on February 14th, 2019 by Responsible Cyber

by Danny Bradbury Phishing sites are common, but this week the internet found a strange strain that’s a little rarer: a phishing site with a URL almost a thousand characters long. Experts have a good theory about why a scammer would go to all that trouble. Bleeping Computer learned of a strange phishing campaign which […]

Read More

Beware of phony or misleading malware rescue web pages

Posted on February 14th, 2019 by Responsible Cyber

Scammers and adware purveyors have long used the helpful nature of the internet to get more victims. In a world where the top search engines try their best to filter out the chaff, scammers still do their best to encourage victims to install unneeded and sometimes malicious software. They often succeed by using scare tactics […]

Read More

Get a Lifetime Subscription to Unlimited VPN for just $59.99 (5 Devices)

Posted on February 6th, 2019 by Responsible Cyber

For all of the undeniable conveniences the Internet has brought us, it’s becoming an increasingly dangerous place to be.Both individual hackers and entire government agencies are now able to hack into your computer or smartphone from across the globe and steal everything from your browsing history to your credit card numbers, and they’re often able […]

Read More

Shellbot Crimeware Re-Emerges in Monero Mining Campaign

Posted on February 6th, 2019 by Responsible Cyber

New attack uses a repurposed version of the Trojan that spreads using Internet Relay Chat. Shellbot crimeware has been spotted in the wild as part of a growing campaign that appears to target infrastructure resources for cryptomining. Tactics, techniques, and procedures observed in this campaign are similar to TTPs seen previousl with the Outlaw Group, […]

Read More