How to develop the right strategy to increase IoT security

As more and more devices become connected, many industries that were previously secure are experiencing new threats or attacks to their devices and services. In this podcast recorded at Black Hat USA 2018, Mark Hearn, Strategic Business Development Man… Continue reading How to develop the right strategy to increase IoT security

Hacking intelligent buildings using KNX and Zigbee networks

A great many of us are living, staying or working in “smart” buildings, relying on automated processes to control things like heating, ventilation, air conditioning, lighting, security and other operation systems. We expect those systems to… Continue reading Hacking intelligent buildings using KNX and Zigbee networks

Trusted identities bridge gap between connected workers and smart buildings

Trusted identities can serve as the backbone for smart buildings and today’s connected workforce, according to a new study conducted by IFSEC Global. The study focused on how the access control infrastructure combined with trusted identities can connect disparate systems for enhanced monitoring and a better user experience as people enter and move around buildings, access various systems and consume building services. According to the report, 85 percent of respondents are aware that identities can … More Continue reading Trusted identities bridge gap between connected workers and smart buildings

Hackathon Alert: Clean Tech At TVCoG

At Hackaday, we get notified of a lot of the cool events going on in hackerspaces all around the world. We’d like to keep you informed too, just in case there’s something going on in your neighborhood.

So we’re going to start running a weekly column on Saturdays that groups together all of the upcoming week’s exceptional events and noteworthy gatherings. If your hackerspace has something going on, let us know on or around the preceding Wednesday. We’ll see your space in on Hackaday!

Tech Valley Center of Gravity: Troy, New York

What would you hack to clean things up …read more

Continue reading Hackathon Alert: Clean Tech At TVCoG

Public safety threat: Cyber attacks targeting smart city services

A new survey conducted by Dimensional Research assessed cyber security challenges associated with smart city technologies. Survey respondents included over 200 IT professionals working for state and local governments. Could a cyber attack targeting critical city infrastructure pose a threat to public safety? When asked if a cyber attack targeting critical city infrastructure posed a threat to public safety, eighty-eight percent of the respondents said, “yes.” In addition, seventy-eight percent of the respondents stated there … More Continue reading Public safety threat: Cyber attacks targeting smart city services

ICS-CERT warns of remotely exploitable power meter flaws

Two remotely exploitable vulnerabilities, one of which can lead to remote code execution, have been found in Schneider Electric’s ION Power Meter products and FENIKS PRO Elnet Energy Meters. What’s more, security researcher Karn Ganeshen, who discovered the flaws, published in detail his findings after the companies kept dragging their feet when it came to fixing the problems or updating him of their progress. The Industrial Control Systems Cyber Emergency Response Team has released alerts … More Continue reading ICS-CERT warns of remotely exploitable power meter flaws

Hacking smart cities: Dangerous connections

Once just a curiosity for technology enthusiasts, the Internet of Things (IoT) has become mainstream. In fact, the IoT security market is estimated to grow from USD 7.90 billion in 2016 to USD 36.95 billion by 2021, at a CAGR of 36.1%, according to MarketsandMarkets. We’re not just talking about devices such as home lightning systems or audio receivers anymore. Today, we are witnessing a surge in the development of smart buildings, routinely plagued by … More Continue reading Hacking smart cities: Dangerous connections

Flaw in HID door controllers lets attackers unlock doors, deactivate alarms

Trend Micro researcher Ricky Lawshae has unearthed a critical vulnerability in HID’s VertX and Edge door controllers. Exploiting the flaw is easy, and could result in attackers gaining complete control of the device, meaning they could unlock doors and switch off alarms controlled through it. HID’s access control systems are ubiquitous, and keep unwanted individuals out of many rooms and spaces in a huge number of office buildings, government complexes, hospitals, aeroports, etc. These vulnerable … More Continue reading Flaw in HID door controllers lets attackers unlock doors, deactivate alarms