article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries analyzed Date range of data: 2003-03-24 to 2019-01-24 (varies by vendor, most up to 2018 releases). [.]. They look at the actual firmware. It represents a wide range of either found in the home, enterprise or government deployments.

IoT 235
article thumbnail

Tainted password-cracking software for industrial systems used to spread P2P Sality bot

Security Affairs

Dragos experts investigated an infection of DirectLogic PLCs from Automation Direct, they performed reverse engineering of the password cracking tool and discovered it did not crack the password at all, rather, it exploited a vulnerability in the firmware to retrieve the password on command. ” reads the advisory published by Dragos.

Passwords 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 284

Security Affairs

Gallagher (AJG) insurance giant discloses ransomware attack FBI and CISA warn of disinformation campaigns about the hack of voter systems Maritime transport and logistics giant CMA CGM hit with ransomware QNAP urges users to update NAS firmware and app to prevent infections Ransomware attack on Tyler Technologies might be worse than initially thought (..)

article thumbnail

Understanding CISA's New Guide on Software Bill of Materials (SBOM)

SecureWorld News

As a CISO since 2003, I can't stress enough how crucial SBOMs are in today's cyber landscape. It's akin to a recipe that details every ingredient used to create a dish. By providing a transparent view of what's inside the software, an SBOM helps organizations manage and mitigate security risks. "As

Software 106
article thumbnail

Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence

The Security Ledger

Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL's big new study of firmware security. » Related Stories Spotlight Podcast: Unpacking Black Hat Hacks with Digicert CTO Dan Timpson Episode 156: Looming over Black Hat: doing Security at Massive Scale Huge Survey of Firmware Finds No Security Gains in 15 Years.

article thumbnail

Hurrah – It’s (patch) Tuesday!

IT Security Guru

It started in 2003, with both security and feature updates on the second, and sometimes further feature updates on the fourth, Tuesday of each month at a time when the software giant would bundle up and issue several patches to fix bugs and security vulnerabilities for its operating systems and applications. Growing threat.

VPN 84
article thumbnail

Wireless Security: WEP, WPA, WPA2 and WPA3 Explained

eSecurity Planet

Wi-Fi Protected Access (WPA) is an improvement of WEP introduced in 2003. Update your router firmware from your router’s manufacturer and install them to ensure your router is up to date and secure. However, this protocol — introduced in 1997 — is outdated and considered insecure because it is easily hackable.