The first-ever smart thermostat ransomware vulnerability was demonstrated in 2016: smart thermostat with an SD card slot for custom settings/wallpapers lacked file-type verification when executing files from the SD card. Attackers could disguise malware as benign files.
www.vice.com/en/article/i...
19.03.2025 12:47 β π 0 π 0 π¬ 0 π 0
Hackers Could Turn LG Smart Appliances Into Remote-Controlled Spy Robot
Login bypass vulnerability in LG smart home appliance app could allow remote hackers to take control of your IoT devices and spy on your home.
Old but gold :)
Impact:Remote account takeover of LG SmartThinQ appliances (e.g., refrigerators, ovens, vacuums) and spying via compromised devices.
Root: Flawed authentication logic in the SmartThinQ app/API, allowing attackers to bypass login.
thehackernews.com/2017/10/smar...
#IoT #cybersecurity
19.03.2025 12:44 β π 0 π 0 π¬ 0 π 0
AIoT framework called MSF-Net for WiFi-based human activity recognition. Unlike typical IoT systems, MSF-Net enables local data acquisition and real-time decision-making. The research aims to improve smart home applications.
ieeexplore.ieee.org/stamp/stamp....
19.03.2025 12:33 β π 0 π 0 π¬ 0 π 0
Light Ears: Information Leakage via Smart Lights
Attacks exploit smart lights' infrared for data exfiltration and multimedia visualization for media inference, lacking proper access control.
What do we know about IoT cybersecurity?
arxiv.org/pdf/1808.07814
19.03.2025 12:28 β π 1 π 0 π¬ 0 π 0
A few key takeaways:
- Perfect security doesnβt exist β Aim for the best possible protection within practical limits.
- Solve the right problem β Focus on real threats, not hype.
- Donβt overcomplicate
- Use layered defense β No single solution is enough.
- Security should be affordable
11.03.2025 19:10 β π 0 π 0 π¬ 0 π 0
I recently read the Venture Security blog: 10 Commandments of Commercial Security.
Adi Shamirβone of the minds behind RSA encryptionβshared 10 timeless principles for building secure systems. Nearly 30 years later, they remain just as relevant.
ventureinsecurity.net/p/10-princip...
11.03.2025 19:10 β π 0 π 0 π¬ 1 π 0
The New Hub for Spyware Startups?
Barcelona has become a major hub for cybercriminals due to its low cost compared to other tech hubs, and after the NSO scandal, Israeli hackers have also shifted their operations to the city, TechCrunchβs Cybersecurity Writer Lorenzo Franceschi-Bicchierai said.
11.03.2025 19:09 β π 0 π 0 π¬ 1 π 0
- Stopping Wireless Attacks: Hackers can jam or spy on wireless signals used in aviation. Special techniques, like adding noise to signals, can stop them.
- Training Are Importan
- The Future of Aviation Security: No doubt that AI will also make some changes here.
11.03.2025 19:07 β π 0 π 0 π¬ 0 π 0
- Safe Software Is Critical: The authors recommend using tools like SPARK to check software for safety before using it in critical systems.
- Protecting Communication Systems: LDACS offers a secure, modern framework for air traffic communications with features like mutual authentication,encryption.
11.03.2025 19:07 β π 0 π 0 π¬ 1 π 0
We need ways to detect and manage them to keep our airspace safe using technologies like radio signals, radar, and smart software.
- Aviation Systems Are at Risk: Hackers can attack systems like GPS, steal data, or shut down communication. Encryption and real-time monitoring, to stop these attacks.
11.03.2025 19:07 β π 0 π 0 π¬ 1 π 0
The book highlights threats like UAS misuse, GNSS spoofing, and physical layer attacks (e.g., jamming), which have likely intensified with technological advancements and geopolitical tensions. Here are the main points:
- Drones Can Be Dangerous: spying, attacks, or hacking aviation systems.
11.03.2025 19:07 β π 0 π 0 π¬ 1 π 0
As connectivity increases, so do cybersecurity risks. How Is Aviation Cybersecurity Today?
Aircraft and air traffic systems are increasingly reliant on networked technologies (e.g., IoT, LDACS, ADS-B), improving efficiency but exposing them to cyber threats.
11.03.2025 19:07 β π 0 π 0 π¬ 1 π 0
Aviation is no longer just about aircraft and pilotsβitβs a complex cyber-physical system heavily reliant on digital infrastructure. I recently had a chance to take a look at the book "Aviation Cybersecurity: Foundations, Principles, and Applications".
11.03.2025 19:07 β π 1 π 0 π¬ 1 π 0
Right now, βinformed consentβ doesnβt really explain the consequencesβlike how heart rate data could track your health but also be used in court or to judge your driving.
Other:
Cyberattacks Are Crazy High: In just the first half of 2021, there were 1.5 BILLION attacks on IoT devices globally.
11.03.2025 19:03 β π 0 π 0 π¬ 0 π 0
82% of respondents lack confidence that IoT devices protect user privacy and data. WWFβs State of the Connected World 2023 Edition says transparency is key: tell users what data is collected, who gets it, and what it could mean.
11.03.2025 19:03 β π 0 π 0 π¬ 1 π 0
What are some problems?
β Many IoT devices ship with factory-set passwords.
β They often have insecure interfaces, meaning weak authentication in web, API, or mobile interfaces can allow unauthorized access.
β Many vendors fail to provide regular updates.
11.03.2025 19:02 β π 0 π 0 π¬ 0 π 0
Are we aware of Internet of Things (IoT) security?
I am playing around with IoT devices and recently found a great resource to build in my VirtualBox, AttifyOS. It is a distro for the penetration testing of IoT devices.
11.03.2025 19:01 β π 0 π 0 π¬ 1 π 0
AI POWERED
17.02.2025 14:01 β π 1 π 0 π¬ 0 π 0
Ahahahahha, work/life balance is broken crypto guys!!
13.02.2025 10:29 β π 0 π 0 π¬ 0 π 0
08.02.2025 16:42 β π 0 π 0 π¬ 0 π 0
One of the very important thing when you start to invest something:
06.02.2025 14:03 β π 0 π 0 π¬ 0 π 0
GitHub - 4lbH4cker/ALHacking: Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Ha...
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack β’ Powerful DDOS attack ...
Recently tried, great tool to help you with ethical hacking, social engineering, discovery, DDoS and more.
YouTube Video: https:// www.youtube.com/watch?v=zgdq...
github.com/4lbH4cker/AL...
03.02.2025 15:35 β π 0 π 0 π¬ 0 π 0
Here is how you invest the future:
03.02.2025 15:34 β π 0 π 0 π¬ 0 π 0
AI can process data, but it canβt fully understand context (for now). Humans can make complex social and emotional inferences by making intuitive decisions.
-A psychologist can sense a clientβs trauma from nonverbal cues.
-A diplomat can read hidden threats from body language.
03.02.2025 15:33 β π 0 π 0 π¬ 0 π 0
AI can analyze data, but it cannot develop new and original ideas (for now). For example, Fleming's discovery of penicillin. He noticed that molds formed in a bacterial culture and killed the bacteria around them. He named the substance produced by this mold penicillin.
03.02.2025 15:33 β π 0 π 0 π¬ 0 π 0
| π appsec | π€ CTO | β¨ indy hacker | ποΈ modular synth | πͺ³ coder | ποΈ camping
Developer of Faction: an open source pentesting framework.
https://github.com/factionsecurity/faction
https://bsky.app/profile/factionsecurity.com
Securing Block (Square) infrastructure. Previously security research at Northeastern University. Internationally acclaimed Schnitzel expert π¦πΉ mweissbacher.com NYC π½
Slacker|Hacker|Racker|Stacker|Farmer
Hacker at Orange Cyberdefense's SensePost Team
https://hello.singe.za.net/
404
YT: https://youtube.com/@paomakes
Signal : @pao.1337
hardware x systems hacker (usually rockets)
Dad, hacker, solo founder of haksec.com and hackercontent.com.
Hacker, Infosec Professional, Pinball wizard wannabe.
Boston/Atlanta
I hack stuff (legally). | co-founder boring.co
Twitter: https://twitter.com/hacker_
Cybersecurity nerd; #DFIR @ Google by day; FOSS, threat intel and malware analysis by night. Investigator, coder, terrible sense of humor.
https://yeti-platform.io and more (github.com/tomchop)
views are my own β’ he/him β’ tomchop.me
Malware Researcher | Developer | @Cryptolaemus1
| @NVIDIA
Will happily talk about malware with anyone.
Cyber guy. Former NSA cybersecurity director and chief of TAO. Lover of memes. Warning - occasional outrageous Christmas light content.
π hey!
π | London, UK
π¨βπ» | Senior Incident Response Consultant
π
ββοΈ | Node.js on the desktop makes me sad
All views are purely mine and don't represent those of my employer, whomever LinkedIn may suggest that is π
// Somehow a CTO
// JHU SAIS @alperovitch.institute adjunct
// @istorg.bsky.social adjunct sr tech advisor
// Former USCYBERCOM/CNMF
// Retired US Marine Corps
// Personal views and invective
infosec person: detection and response, threat hunting, distributed systems. would rather be eating a bagel.
Senior reporter at @CybersecurityDive.bsky.social covering all things digital security. I also co-host @hothtakes.bsky.social. | Send me tips: https://ericjgeller.com/contact.html