Tag Archives: IoT

Vulnerabilities in Realtek SDK put IoT devices at risk

Sicherheit (Pexels, allgemeine Nutzung)[German]Security researchers at IoT Inspector have found multiple vulnerabilities in a Realtek SDK that allow unauthenticated attackers to fully compromise a device and execute arbitrary code with the highest privileges. The SDK is used by many OEMs to implement WiFi features in devices. Realtek has released an updated version of the SDK, but the code is in numerous IoT devices. At least 65 manufacturers are affected by serious security vulnerabilities, and users face the problem that these devices can be taken over by botnets and attackers.


Advertising

Continue reading →


Advertising

Do IoT devices with built-in "radio chips" endanger IT security?

Sicherheit (Pexels, allgemeine Nutzung)[German]Interesting aspect I stumbled upon recently. It's about the question of how Internet of Things (IoT) devices threaten IT security. Because in addition to often serious vulnerabilities in their firmware as well as lack of updates after a short time, there is another problem area. Many devices have built-in WLAN or Bluetooth chips without users being made aware of this when they are sold. The next security issue is emerging.


Advertising

Continue reading →

How to find weak passwords in Active Directory and eliminate them with PowerShell

[Sponsored Post]Weak or compromised passwords are a known gateway for attackers. If you are able to identify which users in Active Directory (AD) are threatened by this, then PowerShell can help to remedy it. However, PowerShell scripts cannot eliminate basic AD deficits, other tools are needed for this. More ...

BadAlloc: Critical bugs found in IoT devices and in OT systems

Sicherheit (Pexels, allgemeine Nutzung)[German]Microsoft security researchers have taken a closer look at Internet of Things (IoT) software used in devices and operational technology (OT) industrial systems. In the process, they have come across more than two dozen critical remote code execution vulnerabilities. The implications affect everything from IoT devices to medical devices to industrial systems.


Advertising

Continue reading →


Advertising

Amnesia:33 – Vulnerability in TCP/IP stack put many IoT devices at risk

[German]Security researchers have found 33 vulnerabilities in open source implementations of the TCP/IP stack. These endanger the device security of around 150 manufacturers. This applies to all devices connected to the Internet and ranges from medical devices to many IoT systems. Here is some information about the vulnerability called Amnesia:33. Continue reading →


Advertising


Advertising

Bug in Thales modules endangers security of millions of connected devices

[German]A vulnerability in Thales modules threatens the security of millions of critical, interconnected devices in the automotive, energy, telecommunications and medical sectors. It allows hackers to hijack the device or access the internal network. In some cases, the vulnerability can be exploited remotely over 3G.  But there are patches from the manufacturer.


Advertising

Continue reading →

Millions of IoT devices easily hackable

[German]Unpleasant, but not surprising, findings from the Def Con 2020: the vast majority of Internet of Things (IoT) devices are open like a hole and easily hackable. Only idiots, naive people, and hasaders use such devices with (unsecured) access from the Internet. Companies could of course still seal off the Internet of Trouble from the Internet with appropriate gateways – but that is not the issue here.


Advertising

Continue reading →


Advertising