Security News

In the 7 years since, threats have become exponentially more advanced, launched by well-funded cyber-criminal groups and nation-state proxies and leveraging automation and AI. And yet the people hacking into Ring cameras weren't highly-technical or using AI. They were Script Kiddies using credentials found and traded on the Dark Web to access devices that did not use 2FA or other additional security mechanisms. As a threat analyst, I have helped companies identify hundreds of IoT devices, from insecure smart refrigerators and CCTV cameras, to compromised video conferencing systems and biometric scanners.

Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found. Security firm Check Point Research has released its findings that many Philips Hue smart light bulbs have a flaw in their firmware, which allows attackers to take control of an individual bulb, push malicious firmware to it, and spread other malicious software throughout a network.

Researchers have demonstrated an ability to compromise an IoT smart bulb, and then use malware from the internet-connected bulb to infiltrate the rest of a network - regardless of whether that is a home or office. In 2016, earlier researchers were able to compromise Philips Hue lightbulbs with malicious firmware, and then propagate to other adjacent lightbulbs.

There are over a hundred potential ways hackers can ruin your life by having access to your WiFi network that's also connected to your computers, smartphones, and other smart devices. In the latest research shared with The Hacker News, Check Point experts today revealed a new high-severity vulnerability affecting Philips Hue Smart Light Bulbs that can be exploited over-the-air from over 100 meters away to gain entry into a targeted WiFi network.

There are over a hundred potential ways hackers can ruin your life by having access to your WiFi network that's also connected to your computers, smartphones, and other smart devices. In the latest research shared with The Hacker News, Check Point experts today revealed a new high-severity vulnerability affecting Philips Hue Smart Light Bulbs that can be exploited over-the-air from over 100 meters away to gain entry into a targeted WiFi network.

O'Reilly, the premier source for insight-driven learning on technology and business, and Formulatedby announced a new conference focused on how machine learning is transforming the future of urban communities and mobility industries around the world. Rapid technological advancements are challenging cities and the mobility industry with new business models, methodologies in development and manufacturing, unprecedented levels of automation, and the need for new infrastructure.

Semtech, a leading supplier of analog and mixed-signal semiconductors and advanced algorithms, announced the launch of LoRa Smart Home, a device designed for LPWAN based smart home, community and consumer applications. "With its simple and flexible network architecture, Semtech's new LoRa® Smart Home device offers a unique opportunity to accelerate the consumer adoption of smart home connected solutions."

A honeypot set up to observe the current security landscape in smart manufacturing systems observed numerous threats-including cryptomining malware and ransomware-in just a few months, highlighting the new threats that industrial control systems face with increased exposure to the internet. To further study these threats, researchers with Trend Micro simulated the fake smart factory system last year in what they called "Our most realistic honeypot to date," according to their report.

Hampton Products is introducing a new collection of indoor and outdoor security cameras to its Array By Hampton suite of smart home products. The new smart home security cameras operate through the Array iOS and Android apps and are part of the Array By Hampton ecosystem of connected home security locks, cameras, lighting and other smart devices.

Frost and Sullivan has predicted that there will be at least 26 fully fledged major smart cities around the world by 2025. This should offer cause for concern to those in charge of smart cities as once a threat actor has infiltrated the IT environment, they could move laterally into an OT system if they are not properly segmented from each other.