article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. These prefixes identify different product lines and vendors that use iLnkP2P.

IoT 279
article thumbnail

US Government And Allies Disrupt Massive Russian Botnet

Data Breach Today

Botnet Targets IoT And Android Devices; Industrial Control Systems And Computers The U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Estonian hacker Pavel Tsurkan pleads guilty for operating a proxy botnet.

Security Affairs

Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of creating and operating a proxy botnet. The Estonian national Pavel Tsurkan has pleaded guilty in a United States court to two counts of computer fraud and abuse. ” reads the press release published by DoJ. . .

article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

Furman for crimes of espionage, computer hacking, contempt of Court, making false statements to the FBI, and child pornography.” The hacking tools developed by the US cyber spies can target mobile devices, desktop computers, and IoT devices such as routers and smart TVs. District Judge Jesse M.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. has made some strides on IoT security at the federal level; it remains to be seen if the EU initiative will spur the U.S. IoT market growth. IoT Security Neglected.

IoT 111
article thumbnail

Sustes Malware: CPU for Monero

Security Affairs

Sustes Malware doesn’t infect victims by itself, but it is spread via brute-force activities with special focus on IoT and Linux servers. Sustes Malware doesn’t infect victims by itself (it’s not a worm) but it is spread over the exploitation and brute-force activities with special focus on IoT and Linux servers.

article thumbnail

Naming & Shaming Web Polluters: Xiongmai

Krebs on Security

If ever there were a technology giant that deserved to be named and shamed for polluting the Web, it is Xiongmai — a Chinese maker of electronic parts that power a huge percentage of cheap digital video recorders (DVRs) and Internet-connected security cameras. A rendering of Xiongmai’s center in Hangzhou, China. BLANK TO BANK.