article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT. Digitally signing software and firmware to ensure integrity and protect from malware.

article thumbnail

How to implant a malware in hidden area of SSDs with Flex Capacity feature

Security Affairs

“Assuming that the hacker can access the management table of the storage device, the hacker can access this invalid data area without any restrictions.” ” reads the research paper. A hacker who gains access to the SSD can activate the embedded malware code at any time by resizing the OP area.”

Paper 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

NIS2 also adds an ‘Important’ sector category, including public communications providers, chemicals, food producers and distributors, critical device manufacturers, social network and online marketplaces, and courier services. Access control policies and asset management. Business continuity/crisis management. Supply chain security.

62
article thumbnail

Hackers claim to have compromised 50,000 home cameras and posted footage online

Security Affairs

Some footages were published on adult sites, experts reported that crooks are offering lifetime access to the entire collection for US$150. The news was reported by The New Paper, which also confirmed that over 70 members already paid the US$150 subscription for lifetime access to the loot. ” reported The New Paper.”

IoT 131
article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. “The unprecedented threat needs to be settled in cooperation of both smartphone and fingerprint sensor manufacturers, while the problems can also be mitigated in OSes,” they wrote.

article thumbnail

Hacking Hardware Security Modules

Schneier on Security

Security researchers Gabriel Campana and Jean-Baptiste Bédrune are giving a hardware security module (HSM) talk at BlackHat in August: This highly technical presentation targets an HSM manufactured by a vendor whose solutions are usually found in major banks and large cloud service providers. Here's a summary in English.

article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

This email address is also connected to accounts on several Russian cybercrime forums, including “ __edman__ ,” who had a history of selling “logs” — large amounts of data stolen from many bot-infected computers — as well as giving away access to hacked Internet of Things (IoT) devices.