A new botnet is slowly building critical mass on the back of unsecured webcams and IP cameras, currently mass-scanning the Internet for vulnerable devices.
Just like Wifatch and Hajime, the BrickerBot malware is also the work of a vigilante grey-hat, who goes online by the name of Janit0r, a nickname he chose on the Hack Forums discussion boards.
Hajime, an IoT malware strain discovered last October, appears to be the work of a vigilante who has set out to take over and neutralize as many smart devices as possible before other botnets like Mirai can get ahold of them.
Security researchers from Pen Test Partners have discovered pretty glaring security flaws in Aga's line of smart ovens.
For around a week at the end of March, one of the many versions of the Mirai malware was spotted delivering a Bitcoin-mining module to its infected hosts, which typically are routers, DVRs, and IP cameras.
A particular TP-Link router model will spew out its admin password in cleatext to anyone that sends an SMS message to the router's SIM card with a particular script inside, according to German security researcher Jan Hörsch.
A Chinese company that manufactures white-labeled DVRs still hasn't patched a security flaw that's been targeted by IoT botnets for over a year.
Over the weekend, a disgruntled customer was taught a lesson in civility after the owner of an IoT company disabled client's product after a post on the vendor's forum and a negative Amazon review.
A "smart" dildo with an embedded video camera, sold under the name of Siime Eye and created and assembled by US manufacturer Svakom, contains a slew of security flaws that allow attackers to watch video streams without authorization and even go as far as to replace firmware and completely take over the device.
Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to malware installed on an air-gapped computer. Further research also revealed the scanner could also be used to relay stolen data to a nearby attacker.
A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV, and use the device for all sorts of nasty actions, ranging from DDoS attacks to spying on end users.
Burglars can use a recently disclosed security flaw affecting several Google Nest cams to make vulnerable cameras go offline for approximately 60 to 90 seconds. The flaw can be exploited via the cameras' Bluetooth connection and can provide thieves with the time window they need to get close and break into a home unseen.
A new malware strain named Imeij has been detected in the wild targeting equipment made by Taiwanese manufacturer AVTech. According to Trend Micro researchers, the malware is exploiting a security flaw which AVTech engineers failed to patch in October 2016.
Lab tests carried out by Dutch scientists have shown that some of today's "smart" electrical meters may give out false readings that in some cases can be 582% higher than actual energy consumption.
What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.
Believe it or not, there are DVRs and IP cameras available online today that you could hack just like in the movies, in a matter of seconds.
Germany's telecommunications regulator has issued a ban against a line of smart toys called "My Friend Cayla," calling the toy an espionage device, and recommending that parents destroy all toy instances at once.
A ransomware infection has locked guests out of their rooms at Romantik Seehotel Jägerwirt, a four-star hotel in the Austrian Alps, on the lip of the Turracher Höhe mountain lake.