Blog Posts Tagged with "Firmware"
How to get into your house through SmartTV
December 14, 2012 Added by:Plagiarist Paganini
Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...
Comments (0)
ICS-CERT: Schneider Quantum Ethernet Module Vulnerability
January 20, 2012 Added by:Headlines
Researcher Rubén Santamarta previously announced hard-coded credentials in the Schneider Electric Quantum Ethernet Module.Exploitation of these vulnerabilities may allow an attacker to gain elevated privileges, load modified firmware, or perform malicious activities on the system...
Comments (0)
HP Printer Hack Video Shows Sensitive Data Tweet Too
December 05, 2011 Added by:Dan Dieterle
The researchers showed how a maliciously formed print job could cause an HP printer’s firmware to be reprogrammed so it acts like a copy machine – sending an exact print job to any place in the world, and the attackers also get a tweet showing sensitive information parsed from the print job...
Comments (1)
Millions of Printers Vulnerable to Hacking Attacks
November 29, 2011 Added by:Headlines
“How many of those printers are out there?’ It could be much more than 100 million... It may ultimately lead to telling everyone they just have to throw their printers out and start over. Fixing this is going to require a very coordinated effort by the industry..."
Comments (0)
EMC Engineer Stole Nearly $1 Million in Hardware
January 10, 2011 Added by:Headlines
Kevin Kelly, a former test engineer with EMC, has plead guilty to making off with almost one million dollars worth of equipment. Kelly concealed the hardware in a duffel bag and then he sold it on the internet. Most of the stolen goods were sold to BL Trading, a Massachusetts-based reseller...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider