Post Profile

Hackers use decade old vulnerability to attack Internet of Things

The Internet of Things (IoT) has the opportunity to reinvent how we visualize the internet, but it also comes with a variety of challenges, including the threat of hackers devastating lives or destroying a business’s assets. This chaotic future may already be upon us, according to researchers at Incapsula. The DDoS protection provider showed a... Read more » The post Hackers use decade old vulnerability to attack Internet of Things appeared first on ReadWrite.
read more


Related Posts

Millions of routers vulnerable to new version of old attack

Technology / Technology Industry News : Ars Technica

A presentation due to be shown at the Black Hat security conference at the end of the month will show that many of the routers used for residential internet connections are vulnerable to attack by hackers. The attacks would allow tr...

Webcam Vulnerabilities are a Major IoT Security Issue

Technology :

by Angela Guess J.M. Porup reports in Ars Technica, “Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams. The feed includes images of marijuana p...

Connecting the IoT: Virtual networks, physical devices, and the era of software-defined everything

Technology : Gigaom

The Internet of Things offers tremendous opportunities to increase the efficiencies of existing processes while planning a complete reinvention and transformation of future business. The potential upside is enormous, and the…

Hackers Infect Army of Cameras, DVRs for Massive Internet Attacks

Technology : Tech -

Hackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability of millions of “smart” devices in homes and businesses conne...

Qadium raises millions to build IoT search engine

Technology : ReadWriteWeb

The Internet of Things (IoT) exposes a variety of security challenges that have been prevalent on the Internet since its inception, but exemplified now that hackers can attack entire governmental or commercial systems worth billions...


Copyright © 2016 Regator, LLC