vulnerabilities

now browsing by tag

 
 

Ring Flaw Underscores Impact of IoT Vulnerabilities

Source: National Cyber Security – Produced By Gregory Evans

A vulnerability in Amazon’s Ring doorbell cameras would have allowed a local attacker to gain access to a target’s entire wireless network.

A vulnerability in Amazon’s Ring Video Doorbell Pro IoT device could have allowed a nearby attacker to imitate a disconnected device and then sniff the credentials of the wireless networks when the owner reconfigured the device, according to a report issued by security firm Bitdefender.

The issue, which was fixed by Amazon in September, underscores the impact of a single insecure Internet-of-Things device on the organization in which it is deployed. While the vulnerability may only occur in a single network device, the result of the flaw could be leaked information — the wireless network password, for example — which  would have far more serious repercussions.

“IoT is a security disaster, any way you look at it,” says Alexandru Balan, Bitdefender’s chief security researcher. “Security is not the strong suit of IoT vendors — only rarely, do we see vendors who take security seriously.”

The discovery of a serious vulnerability in a popular IoT product comes as businesses and consumers increasingly worry about the impact that such devices may have on their own security. Only about half of security teams have a response plan in place to deal with attacks on connected devices, according to recent report from Neustar. Even critical-infrastructure firms, such as utilities that have to deal with connected operational technology, a widespread class of Internet-of-Things devices, are ill-prepared to deal with vulnerabilities and attacks, the report says.

Vulnerabilities in IoT devices can have serious repercussions. In July, a team of researchers found widespread flaws in the networking software deployed in as many as 200 million embedded devices and found millions more that could be impacted by a variant of the issue in other real-time operating systems.

The issue with Amazon Ring is not as serious but it is a reminder that vulnerabilities can still be easily found in the devices by attackers paying attention, says Balan“We tend to look at the popular devices, and those tend to have better security than the less popular devices,” 

The rest of the Ring device’s communications are encrypted and secure, according to Bitdefender. The mobile application only communicates with the device through the cloud, even if the app and device are already on the same network, the company’s analysis stated. Cloud communications are conducted over encrypted connections to API services using Transport Layer Security (TLS) and certificated pinning. 

The device’s initial connection with the local network is the only time that it sends data without encryption, Balan says. “This is a proximity based attack, so its not that big of a threat on a global scale. You need to be with a hundred meters or so to issue the deauthentication packets and force the user to reset the password.”

The existence of the vulnerability is not an indicator of the commitment of Ring’s security team, Balan adds, noting that within a few days Amazon responded and two months later closed out the report. By September, the company issued a patch — within three months after the initial communication, according to Bitdefender’s disclosure timeline. As of November, all affected devices had been patched, which Balan says is a better outcome then the majority of disclosures that Bitdefender works on with other IoT vendors.

“Amazon is one of the few that take security seriously,” he says. “Inherently everything has some flaw that will be discovered. The only challenge with IoT is whether you take that disclosure seriously.”

The trend that more vulnerabilities are being discovered in popular products is a sign that the manufacturers are paying attention and responding to researchers, Balan observes. “If someone does not have vulnerabilities disclosed in their product, then that is likely the most risky product, from a security perspective. If the vulnerabilities were discovered, then props to them — that’s a good thing.”

Related Content

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What a Security Products Blacklist Means for End Users and Integrators.”

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

More Insights

Click here for the news story.

The post Ring Flaw Underscores Impact of IoT Vulnerabilities appeared first on National Cyber Security.

View full post on National Cyber Security

How to #Minimize #Cybersecurity #Vulnerabilities

Source: National Cyber Security News

When it comes to cybersecurity, your chief objective should be to manage things proactively and on your terms, as opposed to constantly playing catch-up and responding to vulnerabilities only after they’ve been exploited.

Unfortunately, too many organizations, including the U.S. federal government, still operate in a reactive mode because they generally lack two things: 1) accurate visibility into their own IT infrastructure and the potential cyber vulnerabilities lurking there; and 2) up-to-date, accurate information to help them prioritize and manage their vulnerabilities from a risk-management perspective.

After a decade of experience consulting with U.S. federal agencies, I’ve found it all too common for organizations to have little to no insight into the End-of-Support/End-of-Life (EOS/EOL) dates for their software and hardware assets. Many also don’t know the Common Vulnerability Scoring System (CVSS) values of their hardware and software assets.

This is understandable. Today, there are 31 million naming conventions that exist for 2 million hardware and software products—including, for example, 16,000 ways that inventory tools refer to an SQL Server. This lack of uniformity for how specific products are referred to results in a confusing hodgepodge of data that undermines most efforts at obtaining a comprehensive view of a network’s IT asset inventory and risk profile.

Read More….

advertisement:

View full post on National Cyber Security Ventures

CYBERSECURITY BILL TAKES AIM AT VULNERABILITIES IN MEDICAL DEVICES

Source: National Cyber Security – Produced By Gregory Evans

On July 27, U.S. Senator Richard Blumenthal (D-CT) introduced the Medical Device Cybersecurity Act of 2017, a bill that CHIME supports. The legislation, S.1656, would make the cybersecurity capabilities of medical devices more transparent to providers, clarifies expectations concerning security enhancements and maintenance of medical devices and establishes a cybersecurity…

The post CYBERSECURITY BILL TAKES AIM AT VULNERABILITIES IN MEDICAL DEVICES appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Vulnerabilities in infrastructure software concern cybersecurity experts

Source: National Cyber Security – Produced By Gregory Evans

Vulnerabilities in infrastructure software concern cybersecurity experts

Vulnerabilities in software that automates everything from factories to traffic lights has become the nation’s top cybersecurity threat, an agent on the FBI’s Denver Cyber Task Force said Thursday in Colorado Springs. Supervisory control and data acquisition software is used to control – sometimes remotely – many types of devices…

The post Vulnerabilities in infrastructure software concern cybersecurity experts appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Connected car technology vulnerabilities tested in Cyber Security Challenge

Source: National Cyber Security – Produced By Gregory Evans

Connected car technology vulnerabilities tested in Cyber Security Challenge

Amateur hackers have tested how to penetrate a car rental company’s IT system through a third-party Internet-connected device installed in one of its vehicles. The scenario, enacted as part of the Cyber Security Challenge 2017, saw six groups of aspiring …

The post Connected car technology vulnerabilities tested in Cyber Security Challenge appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

GSA to join DoD in hiring ethical hackers to find cyber vulnerabilities

Source: National Cyber Security – Produced By Gregory Evans

The federal market for “white hat” hackers continues to grow. Not only are ethical security burglars popular in the Defense Department, but now the General Services Administration’s Technology Transformation Service (TTS) is setting up a bug bounty program. TTS issued …

The post GSA to join DoD in hiring ethical hackers to find cyber vulnerabilities appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Tesla’s hack vulnerabilities are being solved

Source: National Cyber Security – Produced By Gregory Evans

CALIFORNIA – Silicon Valley electric automaker Tesla Motors (NASDAQ: TSLA) reported on Tuesday that it has delivered a software patch to fight against hackers who have wanted to take charge of the Tesla Model S. Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, and Marc Rogers, principal security researcher for CloudFlare, found six key weaknesses in the Model S early this week ahead of a presentation on Friday at the Def Con hackers conference in Las Vegas. However, users do not have to worry for it did not take long until the company recalled for a fix. Tesla has a characteristic that can be a model for other automakers: it has the ability to update owner’s vehicles and send a quick fix over the internet. Researches also emphasize that to hack a Model S vehicle, the hacker must be close to it, which makes it difficult for them to hack over the airwaves. “In order to realistically patch vulnerabilities at the frequency they are discovered, manufacturers must implement an over-the-air patching system into every connected car,” Mahaffey posted on his blog. “When a manufacturer realizes that a software vulnerability affects their vehicles, they can deploy a patch immediately in […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Tesla’s hack vulnerabilities are being solved appeared first on National Cyber Security.

View full post on National Cyber Security

Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital SystemsNational Cyber Security

nationalcybersecurity.com – REDWOOD CITY (KPIX 5) — Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. Jay Kaplan heads up Sy…

View full post on Hi-Tech Crime Solutions Weekly

Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems

Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems

REDWOOD CITY (KPIX 5) — Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Apple Pay Will Have Some Security Vulnerabilities

Apple Pay Will Have Some Security Vulnerabilities

Apple Pay couldn’t have arrived at a better time; security breaches in major retailers appear almost daily in the news, and consumers are looking for a more secure way to pay. And while Apple Pay may address that need for […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security