Why You Should Use Your Router As A Security Camera

A home security camera can be great for peace of mind, and keeping an eye on the house while you’re away. The popular option these days is an IP-based device that is accessible over the Internet through an ethernet or wireless connection to your home router. But what if you could cut out the middle man, and instead turn your router itself into the security camera? [Fred] is here to show us how it’s done.

The hack begins by parsing the original router’s firmware. Through a simple text search, a debug page was identified which allowed telnet access to the …read more

Continue reading Why You Should Use Your Router As A Security Camera

Hackers Prepping IOTroop Botnet with Exploits

Researchers warn that hackers have weaponized a vulnerability that could be used in an IOTroop (or Reaper) attack, bringing the likelihood of an attack one step closer. Continue reading Hackers Prepping IOTroop Botnet with Exploits

Reaper: Calm Before the IoT Security Storm?

It’s been just over a year since the world witnessed some of the world’s top online Web sites being taken down for much of the day by “Mirai,” a zombie malware strain that enslaved “Internet of Things” (IoT) devices such as wireless routers, security cameras and digital video recorders for use in large-scale online attacks.

Now, experts are sounding the alarm about the emergence of what appears to be a far more powerful strain of IoT attack malware — variously named “Reaper” and “IoTroop” — that spreads via security holes in IoT software and hardware. And there are indications that over a million organizations may be affected already.

Reaper isn’t attacking anyone yet. For the moment it is apparently content to gather gloom to itself from the darkest reaches of the Internet. But if history is any teacher, we are likely enjoying a period of false calm before another humbling IoT attack wave breaks. Continue reading Reaper: Calm Before the IoT Security Storm?

Reaper: Calm Before the IoT Security Storm?

It’s been just over a year since the world witnessed some of the world’s top online Web sites being taken down for much of the day by “Mirai,” a zombie malware strain that enslaved “Internet of Things” (IoT) devices such as wireless routers, security cameras and digital video recorders for use in large-scale online attacks.

Now, experts are sounding the alarm about the emergence of what appears to be a far more powerful strain of IoT attack malware — variously named “Reaper” and “IoTroop” — that spreads via security holes in IoT software and hardware. And there are indications that over a million organizations may be affected already.

Reaper isn’t attacking anyone yet. For the moment it is apparently content to gather gloom to itself from the darkest reaches of the Internet. But if history is any teacher, we are likely enjoying a period of false calm before another humbling IoT attack wave breaks. Continue reading Reaper: Calm Before the IoT Security Storm?

‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says Researcher

Malware dubbed IOTroop that researchers say is “worse than Mirai” has already infected one million businesses worldwide. Continue reading ‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says Researcher

Netgear Fixes 50 Vulnerabilities in Routers, Switches, NAS Devices

Netgear patches over a dozen vulnerabilities impacting its routers, switches and NAS devices. Continue reading Netgear Fixes 50 Vulnerabilities in Routers, Switches, NAS Devices

Threatpost News Wrap, June 2, 2017

Mike Mimoso and Chris Brook discuss the news of the week, including the ShadowBrokers crowdfunding attempt, errors in WannaCry, a new Wikileaks dump, last week’s Samba vulnerability, and the OneLogin breach.

Continue reading Threatpost News Wrap, June 2, 2017

May 23, 2017 – Hack Naked News #126

Exploiting media players using subtitles, Netgear is recording your IP and MAC address, net neutrality is on the chopping block, Yahoobleed attack, and EternalRocks. Jason Wood of Paladin Security joins us to explain why companies should (or should not… Continue reading May 23, 2017 – Hack Naked News #126