Redcar & Cleveland Council confirms ransomware attack
ComputerWeekly.com – Local authority’s systems are still offline nearly three weeks after being attacked. Redcar & Cleveland Borough Council in northern England has confirmed it has fallen victim to a ransomware attack targeting its server estate, which has kept it offline since the weekend of 8 February.
Seven in 10 companies know of hacks against their IoT devices, research finds
IoT News – The IoT is barreling towards the enterprise – but companies remain highly vulnerable to IoT-based attacks, according to a new report. Earlier this month, a study titled ‘LoRaWAN Networks Susceptible To Hacking: Common Cyber Security Problems, How To Detect And Prevent Them’ by computer security firm IOActive found a host of cybersecurity issues in the LoRaWAN protocol that could put network users at risk of attacks. The study also warned about widespread disruption and even risk to life that could occur in some extreme cases.
New research shows how easily LoRaWAN smart devices networks can be hacked
IoT News – A new research paper from IOActive has found a host of cybersecurity issues in the LoRaWAN protocol that could put network users at risk of attacks. The study, titled ‘LoRaWAN Networks Susceptible To Hacking: Common Cyber Security Problems, How To Detect And Prevent Them’, warned widespread disruption and even risk to life could occur in some extreme cases.
Week in review: UN hacked, new Kali Linux release, Win7 upgrade dilemma
Helpnet Security – IOActive researchers found that the LoRaWAN protocol – which is used across the globe to transmit data to and from IoT devices in smart cities, Industrial IoT, smart homes, smart utilities, vehicle tracking and healthcare – has a host of cyber security issues that could put network users at risk of attack.
HACKADAY LINKS: FEBRUARY 2, 2020
Hackaday – We saw a lot of articles this week on a LoRaWAN security vulnerability. The popular IoT network protocol has been billed as “secure by default”, but a white paper released by cybersecurity firm IOActive found a host of potential attack vectors. Their main beef seems to be that client devices which are physically accessible can be reverse engineered to reveal their encryption keys.