Belkin WeMo smart home networks in danger of hacks

Wednesday, February 19th, 2014

Smart home networks are rapidly gaining popularity, but some security experts worry that not enough encryption controls are coming with the products. Security firm IOActive released an advisory (PDF) on Tuesday saying more than half a million Belkin WeMo devices are susceptible to widespread hacks. The firm uncovered several vulnerabilities in these devices, ...

Exploit released for vulnerability targeted by Linksys router worm

Monday, February 17th, 2014

Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...

Anti-theft Software Could Be Attackers’ Conduit to Millions of PCs

Thursday, February 13th, 2014

A useful cyber-defensive utility can be turned into a powerful tool for cyber-attackers in the form of full access to millions of users' computers, according to research from Kaspersky Lab regarding an element of Absolute Software’s anti-theft software. The focus of the Kaspersky research was the Absolute Computrace agent that resides ...

New Malware Records Everything You Do on Your iPhone

Friday, January 31st, 2014

Everyone typically beats up on Android for posing a security risk, with its third-party app stores and Google’s open access policies. But Apple iOS is not entirely above the fray, as a new proof-of-concept (PoC) “screenlogging” malware shows. Neal Hindocha, a senior security consultant for Trustwave, is planning to demonstrate a ...

Six more US retailers hit by Target-like hacks, security firm says

Saturday, January 18th, 2014

Cybercriminals have stolen payment card data from six more U.S. retailers using similar point-of-sale malware that compromised Target, a computer crime intelligence company said Friday. The conclusion comes from a study of members-only forums where cybercriminals buy and sell data and malicious software tools, said Dan Clements[cq], president of IntelCrawler, which ...