Ever wonder which parts of the country have the most unprotected devices? A recent Dark Reading article shared research on the geographical distribution of discoverable, unprotected, Internet-connected devices among the 10 most populated cities in the US. The study showed that firewalls were the top exposed service within each city, while routers, wireless access points, … [Read more...]
DefCon Researcher Details Security Flaws in Bluetooth Locks
There are a lot of fascinating findings from Black Hat & DefCon last week, but this one might make you want to change your Bluetooth locks. Researcher Anthony Rose was testing his Bluetooth range-finding setup in his neighborhood, and was not only surprised to see Bluetooth locks popping up, but as he told Engadget, "I discovered plaintext passwords being sent that anybody … [Read more...]
MouseJack – Daily Security Byte EP. 223
Besides being 2016's first set of vulnerabilities with a marketing name, MouseJack is a group of security flaws that might allow attackers to hijack your computer via a wireless mouse or keyboard. Watch today's Byte to learn more about this flaw, and what you might do about it. (Episode Runtime: 2:28) Direct YouTube Link: https://www.youtube.com/watch?v=FQVFvnhQaBQ EPISODE … [Read more...]
BB-8 Hacked – Daily Security Byte EP. 204
Today's video covers an Internet of Things (IoT) hack for Star Wars geeks (like me). It's not really dangerous, and probably won't get exploited in the next "cyber war," but its interesting nonetheless. Watch below to learn more. (Episode Runtime: 2:42) Direct YouTube Link: https://www.youtube.com/watch?v=3YREQah6PXQ EPISODE REFERENCES: Researchers blog post on small … [Read more...]
Cyber Blackout – Daily Security Byte EP. 195
Security researchers and Hollywood have long predicted network hacks that could take out the power grid. Well, we may finally have a confirmed example of a blackout caused by a cyber attack in the Ukraine. Watch today's video to learn about this new news and how you might avoid a common trend in advanced attacks. (Episode Runtime: 3:25) Direct YouTube … [Read more...]