Bot creates millions of fake eyeballs to rip off smart-TV advertisers

The massive ICEBUCKET scheme has, so far, impersonated more than 2m people in 30+ countries, defrauding more than 300 brands of ad dollars. Continue reading Bot creates millions of fake eyeballs to rip off smart-TV advertisers

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints. Continue reading New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn

TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs. Continue reading Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn

Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories. Continue reading Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

Smart TVs, Subscription Services Leak Data to Facebook, Google

Researchers discovered that smart TVs from Samsung, LG and others are sending sensitive user data to partner tech firms even when devices are idle. Continue reading Smart TVs, Subscription Services Leak Data to Facebook, Google

Investigating IoT Crime in the Age of Connected Devices

To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.

The post Investigating IoT Crime in the Age of Connected Devices appeared first on Security Intelligence.

Continue reading Investigating IoT Crime in the Age of Connected Devices

WikiLeaks Dumps Docs on CIA’s Hacking Tools

WikiLeaks on Tuesday dropped one of its most explosive word bombs ever: A secret trove of documents apparently stolen from the U.S. Central Intelligence Agency (CIA) detailing methods of hacking everything from smart phones and TVs to compromising Internet routers and computers. KrebsOnSecurity is still digesting much of this fascinating data cache, but here are some first impressions based on what I’ve seen so far. Continue reading WikiLeaks Dumps Docs on CIA’s Hacking Tools

WikiLeaks Dumps Docs on CIA’s Hacking Tools

WikiLeaks on Tuesday dropped one of its most explosive word bombs ever: A secret trove of documents apparently stolen from the U.S. Central Intelligence Agency (CIA) detailing methods of hacking everything from smart phones and TVs to compromising Internet routers and computers. KrebsOnSecurity is still digesting much of this fascinating data cache, but here are some first impressions based on what I’ve seen so far. Continue reading WikiLeaks Dumps Docs on CIA’s Hacking Tools