article thumbnail

MY TAKE: Why DDoS weapons will proliferate with the expansion of IoT and the coming of 5G

The Last Watchdog

Related: IoT botnets now available for economical DDoS blasts. In March 2013, several impossibly massive waves of nuisance requests – peaking as high as 300 gigabytes per second— swamped Spamhaus , knocking the anti-spam organization off line for extended periods. In fact, it can be argued that the opposite is happening. Barest tip.

DDOS 263
article thumbnail

Threat Modeling & IoT

Adam Shostack

You can start threat modeling IoT with the four question framework: What are you building? But there are specifics to IoT, and those specifics influence how you think about each of those questions. In the IoT world, the question of did we do a good job becomes have we done a good enough job? What can go wrong? Don Bailey)

IoT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two NSA Algorithms Rejected by the ISO

Schneier on Security

These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors.

IoT 194
article thumbnail

BotenaGo botnet targets millions of IoT devices using 33 exploits

Security Affairs

Researchers at AT&T discovered a new BotenaGo botnet that is using thirty three exploits to target millions of routers and IoT devices. BotenaGo is a new botnet discovered by researchers at AT&T that leverages thirty three exploits to target millions of routers and IoT devices. CVE-2016-6277 NETGEAR R6250 before 1.0.4.6.Beta,

IoT 139
article thumbnail

New TCP/IP Vulnerabilities Expose IoT, OT Systems

eSecurity Planet

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things (IoT), Operational Technology (OT), and IT devices. Also Read: 5 Essential IoT Security Best Practices. Consumer Internet of Things (IoT). Affected TCP/IP stacks.

IoT 141
article thumbnail

New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

Security Affairs

The ShellScript is loaded onto IoT devices such as IP cameras, and network devices, revealing that the Murdoc Botnet specifically targets IoT devices via this mechanism, leveraging C2 servers for new Mirai variant propagation. The Qualys Threat Research Unit discovered over 500 samples containing ELF files and ShellScript files.

IoT 81
article thumbnail

Customised Ubiquiti Clients and Randomised MAC Addresses on Apple Devices

Troy Hunt

We've known about this for years; even back in 2013, rubbish bins in London were tracking people via their MAC addresses so this isn't a new thing. The root cause quickly became evident: MAC addresses are effectively unique identifiers and the appearance of the same one over and over again provides the ability to track devices.

IoT 362