The Bogeyman Threat of IoTs in Your Networks
What is a Man In The Middle (MITM) attack? What are the rising vulnerabilities, and what can we do to protect our unmanaged networks & IoTs?
Communication Service Providers – Know Your Networks!
Of course, service providers “know” their networks – fibre-optic lines, wireless infrastructure, central office equipment and the last mile connections to their customers – but what’s connected to the networks, often via router endpoints is another matter. It’s time to take a fresh look at this issue – that is, the millions of unprotected home and small business networks and the hundreds of millions of computing, personal and IoT devices around the world.
2021 IoT Security Landscape
This report’s findings are based on in-depth research, security sources, and data collected from 132 million active IoT devices and 730,000 networks. We’ve analyzed DoS, DDoS, brute force attacks, DPI signature-based attacks, phishing attacks and more. More than 1 billion IoT attacks took place in 2021, nearly 900 millions of which were IoT-related phishing attacks.
Unmanaged Security Networks
What is an unmanaged security network? Within the security sphere, you often hear of Wi-Fi networks being referred to as either “managed” or “unmanaged.” As these networks are at the center of the things we do online, it’s important to remain informed about their capabilities (and potential weak spots and vulnerabilities). So what is it […]
Can a Hacker Remotely Connect to Your Wi-Fi Camera?
Updated as of 27.10.21 with information about about vulnerability patching from the affected vendors. ——– This research was performed by Matan Borenshtein and Alex Gelman from SAM’s Data Department. Take a quick mental inventory of the smart devices in your life. This includes gadgets located throughout your home, your office, and even those that you […]
Multiple Attempts to Exploit Realtek Vulnerabilities Discovered by Our Researchers
On August 16th, three days ago, multiple vulnerabilities in a software SDK distributed as part of Realtek chipsets were disclosed by IoT Inspector Research Lab [1]. The vulnerabilities allow attackers to fully compromise and take control of affected devices. Just yesterday, only two days after the publication, our home security solution, Secure Home, detected attempts […]
Virtual Patching: What Is It and Why Is It Foundational for Keeping Home and Small Business Networks Secure?
Security vulnerabilities are the cause of most cyber security attacks. Hackers exploit vulnerabilities in software to propagate malware, steal information, and infiltrate computer networks. Vulnerabilities arise from errors in software implementation. While these errors mostly cause bugs which are merely an inconvenience for users, some open a door to malicious activity. The most severe vulnerabilities […]
Unresolved Vulnerability in Western Digital Device Left Open Door for Hackers to Erase Personal Data
Hard drive vendor Western Digital is urging its customers to disconnect their network storage devices from the internet, after determining that devices are being compromised by hackers and their data completely wiped [1]. According to the official security advisory, a vulnerability from 2018 is being used to hack MyBook network storage devices [2]. The devices in […]
2020 IoT Security Landscape
Our team of researchers developed an overview of IoT security discoveries and recommendations as it relates to home and SMB networks. This information is based on the most up-to-date research, recent security sources, and data collected from 100M devices and 2M homes. Over the last year, 200 vulnerabilities were found in IoT devices that impact […]