The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure.
The onus behind IoT security has become so muddled that no one knows who to point fingers at.
Researchers were able to discover a way to hack the device in less than an hour.
The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices.
Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature.