<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet of Things Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/internet-of-things/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/internet-of-things/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Fri, 30 Mar 2018 22:04:41 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Internet of Things Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/internet-of-things/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Overwhelming attack sets new record.</title>
		<link>https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 10:22:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1166</guid>

					<description><![CDATA[<p>An overwhelming attack on a customer of a US service provider a few days ago has set a new record for the sheer volume of data used in the attack. We&#8217;ve seen records set last year, but this new one is enormous. At it&#8217;s peak, it is reported to have hit 1.7Tbps. For those of you&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/">Overwhelming attack sets new record.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1167" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/DDOS-Attack-150x150.jpg" alt="Overwhelming attack" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/DDOS-Attack-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/DDOS-Attack.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />An overwhelming attack on a customer of a US service provider a few days ago has set a new record for the sheer volume of data used in the attack. <span id="more-1166"></span>We&#8217;ve seen records <a href="https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/">set last year</a>, but this new one is enormous. At it&#8217;s peak, <a href="https://www.arbornetworks.com/blog/asert/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us/">it is reported</a> to have hit 1.7Tbps. For those of you unfamiliar with internet speed measurements, this would be equivalent of 18,000 eirFibre broadband customers using their full internet 100Mbps speed to download data at the exact same time. All of that data would be pointed at a single service.</p>
<h3>What is the source of this overwhelming attack?</h3>
<p>A vulnerability was discovered recently with certain servers that are exposed to the internet. If a certain type of packet was sent to the server with a small amount of data, the server would reply to the packet with a much greater quantity of data &#8211; in <a href="https://www.theregister.co.uk/2018/03/05/worlds_biggest_ddos_attack_record_broken_after_just_five_days/">some cases</a> up to 50,000 times more data.</p>
<p>Now most of you are thinking, well that would mean the server would reply to the sender with a big hunk of data and so overwhelm the bad guy.</p>
<p>The thing about the type of packet in question (officially known as User Datagram Protocol or UDP) is that the sender can change the source address of the packet to &#8220;spoof&#8221; where the packet came from. The vulnerable server will blindly believe that the reply should go to the victim and add lots of additional data. This is all because there is no verification of the source address when UDP packets are used.</p>
<p>So all the evil doer needs to do, is locate a large number of vulnerable servers, send them each a packet of data with the same spoofed source address and the servers will send a greater amount of data back to the victim address and cause an overwhelming attack on any services they have exposed to the internet. The following is a simple diagram of how this works &#8211; in this case a 1 Megabyte request gets amplified to 15 Megabytes:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1168 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack.jpg" alt="Amplification attack" width="1039" height="730" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack.jpg 1039w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack-300x211.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack-768x540.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Amplification-Attack-1024x719.jpg 1024w" sizes="(max-width: 1039px) 100vw, 1039px" /></p>
<h3>So what can I do if I get hit?</h3>
<p>If you fall victim to one of these attacks, the evil doers may contact you and demand a ransom payment to stop the attack.</p>
<p>Your first place to call is your Internet Service Provider (ISP). They may have a facility to mitigate such attacks or they can engage a third party company to do so. These services may not be cheap however &#8211; so you&#8217;ve got to balance this cost against any ransom that may be demanded.</p>
<p>Bear in mind, that if you do pay the ransom once, the chances are you&#8217;ll do so again (at least one more time).</p>
<p>My advice is don&#8217;t pay the ransom.</p>
<p>Engage the good guys to mitigate the attack.</p>
<p>Finally report the crime to <a href="https://www.garda.ie/en/">An Garda Síochána</a>.</p>
<p>What? Why???</p>
<p>A crime was committed.</p>
<p>No, they probably won&#8217;t be able to do anything about it.</p>
<p>But the more reports that the Gardai record on cyber crime, these will begin to factor in their statistics, which will mean once the scale of cyber crime is seen, they will begin to receive an adequate budget to deal with this type of crime, which they badly need.</p>
<p>The post <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/">Overwhelming attack sets new record.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of my 2017 predictions.</title>
		<link>https://www.l2cybersecurity.com/review-2017-predictions/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 28 Dec 2017 15:02:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Predictions]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1048</guid>

					<description><![CDATA[<p>I don&#8217;t see many people who make predictions for the coming year actually come back to review what they predicted. I&#8217;m not one of those though, so here is my review. I&#8217;ve included the original text below in blue, but the full article for my 2017 predictions is here. 1. Ransomware levels will plateau, but&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2017-predictions/">Review of my 2017 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1049" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300-150x150.jpg" alt="2017 Predictions" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />I don&#8217;t see many people who make predictions for the coming year actually come back to review what they predicted. I&#8217;m not one of those though, so here is my review. I&#8217;ve included the original text below in <span style="color: #0000ff;">blue</span>, but the full article for my 2017 predictions is <a href="https://www.l2cybersecurity.com/2017-predictions-cyber-security/">here</a>.<span id="more-1048"></span></p>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">1. Ransomware levels will plateau, but constantly change</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This might be an easy one to get right. Ransomware is already embedded in over 90%+ of all phishing e-mails, so there&#8217;s hardly any further room to keep growing. We&#8217;ve already started to see the way it is changing though. As was reported earlier this month, you could get your files unlocked if <a style="color: #0000ff;" href="http://www.theregister.co.uk/2016/12/11/ransomware_offer_pay_us_a_770_ransom_or_infect_two_friends/">you infected two friends</a> with this Ransomware rather than paying money over to the hackers.</span></p>
<p>I haven&#8217;t seen the stats yet, but I suspect Ransomware is still as big a problem as it was 12 months ago. And as noted, the evil doers have started using new methods to get money out of people by hijacking the victims computer processing power to mine <a href="https://www.engadget.com/2017/12/15/as-online-ads-fail-sites-mine-cryptocurrency/">crypto-currencies</a> (i.e. create new currency for them). We also had the scary prospect of Ransomware worms thanks to <a href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> and <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya</a>. So I&#8217;m going to say I got this one right.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">2. Smart Device Botnets will target the big service providers</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="color: #0000ff;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">We&#8217;ve seen <a style="color: #0000ff;" href="http://blog.l2cybersecurity.com/2016/09/have-you-smart-internet-connected-iot.html">record breaking botnets created this year</a> by poorly designed and poorly secured smart devices </span><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">(also referred to as IoT, e.g.- </span><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">internet connected cameras, digital video records, internet routers, etc.). I suspect the evil doers are building a massive army, much bigger than anything we have seen to date. I believe that they will then carry out a coordinated attack on one of the big service providers (e.g.- Google, Amazon or Microsoft). The attack won&#8217;t be fully successful, but will have caused sufficient disruption to make smart device security a focus for all manufacturers of such devices, as insecure devices will be banned from accessing the web.</span></span></p>
<p>This was a miss. While attacks did take place, there was nothing on the scale that we saw in 2016.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">3. There will be an even bigger data leak than 2016&#8217;s revelation of the Yahoo! world record leak</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yahoo! has really had a bad year, setting a world record, having already had an even <a style="color: #0000ff;" href="http://blog.l2cybersecurity.com/2016/12/yahoo-tries-for-new-world-record-and.html">bigger world record</a>. I believe bigger leaks have already happened and will be revealed next year. I reckon the bad guys are already combing through the data, cracking passwords and will then create tools that will take the IDs and passwords they have and try these against other services (e-mail, social media, etc.) to generate a list of compromised accounts, which are extremely valuable on the dark net.</span></p>
<p>I got this one right. It was Yahoo! that did it again, with over <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">3 billion records</a> breached.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">4. Russia will be accused of interfering in elections occurring across Europe</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Russia has shown form this year, interfering with the US Presidential Election. With elections happening in the bigger European Countries (Germany, France and The Netherlands) in 2017, I would not be very surprised to discover that the Russian state hackers tried to influence the results of these.</span></p>
<p>While the German and Dutch elections were not outwardly (at least) subject to the same issues as affected the US elections, there was <a href="https://www.nytimes.com/2017/05/05/world/europe/france-macron-hacking.html">an incident</a> during the French elections which looks likely to be an attempt to influence the voters. A dump of campaign documents including emails and accounting records for Emmanuel Macron&#8217;s campaign was released just before a moratorium on communications came into effect. So I&#8217;ll take a partial on this one.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">5. More Irish people will be protecting themselves from Cyber Threats</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ll be a bit selfish with this one as I will be the one helping these people to protect themselves. People knowing how to stay safe on-line will be the least likely to be affected by a Cyber Threat.</span></p>
<p>While I did protect more Irish people in 2017 by educating them, it wasn&#8217;t as many as I would have liked. So, again I will take a partial on this one. A little something called the GDPR became more important to people so, in conjunction with <a href="http://www.mjonfc.ie/">Molly O&#8217;Neill</a>, we created training and awareness programmes for businesses.</p>
<h3>Results for my 2017 predictions</h3>
<p>2 correct, 2 partials and 1 incorrect. Not too bad. I may give this another go for 2018.</p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/review-2017-predictions/">Review of my 2017 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quad9 &#8211; Safer addressing on the internet</title>
		<link>https://www.l2cybersecurity.com/quad9-safer-addressing-internet/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Nov 2017 11:42:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1000</guid>

					<description><![CDATA[<p>I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make life safer for everyone. Basically if you use this service, it will pretty well prevent any malicious software from connecting your laptop, tablet, phone, smart watch,&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9 &#8211; Safer addressing on the internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1001" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9-150x150.jpg" alt="Quad9 Safer Addressing" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Quad9.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make life safer for everyone. <span id="more-1000"></span>Basically if you use this service, it will pretty well prevent any malicious software from connecting your laptop, tablet, phone, smart watch, smart toaster, smart whatever to an evil doer&#8217;s website, because it will not resolve the address. It can&#8217;t give 100% guaranteed protection, but it&#8217;ll be extremely effective &#8230; and did I mention, it&#8217;s FREE?!?!</p>
<h2>What is DNS?</h2>
<p>A Domain Name Service is the backbone of addressing, as every website is stored on a server located somewhere on the internet. Your favourite security website (<a href="http://www.L2CyberSecurity.com">www.L2CyberSecurity.com</a>) is sitting on a server in Dublin. That server has an Internet address of 217.78.11.90. You don&#8217;t need to know that long-winded number. You just need to know the nice, friendly name L2CyberSecurity.com. When you type that address, or click a link to that address in your browser, your PC/Laptop will pass the friendly name to some DNS server (whichever one it is configured to use), that will then return the long-winded number to the browser, so off it goes to that server and dishes up the webpage to you.</p>
<h2>How does the existing DNS fail to protect me?</h2>
<p>If you currently use the DNS server that your provider gives you, or perhaps <a href="https://www.opendns.com/">OpenDNS</a> or <a href="https://developers.google.com/speed/public-dns/">Google&#8217;s DNS,</a> then if you get infected with malicious software, this will probably try to &#8220;phone home&#8221;, i.e.- connect with a server controlled by the evil doers. It will look to connect to the server by referencing a friendly name (e.g.- www.scaryevilhackersoftware.co) and the <em>usual</em> DNS servers will resolve that to the bad guys server and facilitate the connection.</p>
<p>IT&#8217;S NOT THEIR FAULT! This is how the internet is supposed to work.</p>
<h2>How does Quad9 protect me?</h2>
<p>The good people over at IBM, the Packet Clearing House (PCH) and Global Cyber Alliance came together and set-up this global service. They have made it genuinely free to use, without any sneaky monitoring of what you do. When you have it set-up, <a href="https://www.quad9.net">Quad 9</a> will check a site you are trying to connect to against the IBM X-Force threat intelligence database of over 40 billion analysed web pages and images. it also uses feeds from 18 additional threat intelligence partners to block a large portion of the threats that present risk to end users and businesses alike. If the site you are trying to connect with is a known evil site, Quad9 will NOT resolve the friendly address to the long winded number. It will effectively return a &#8220;domain/site does not exist&#8221;.</p>
<h2>That sounds great. How do I set it up?</h2>
<p>For a business environment, please contact your IT Department or IT Service Provider. There could be internal DNS server dependencies which, if you implemented Quad9, might break an application. IT will need to make a determination on whether it can be implemented or not.</p>
<p>For home users, on the <a href="https://www.quad9.net/#/#setup-quad9">Quad 9 home page</a> there are videos and instructions for configuring Mac and Windows desktops/laptops.</p>
<p>However, for the best possible coverage, I would recommend you have this setting applied to the router or modem that your service provider installed with your connection. It should be noted that some internet providers do not allow changes to be made to their router (Imagine and Sky are two examples). You may need to log a support request to have the change applied to your router.</p>
<p>If you are, or know somebody who is technically competent (and game-playing teenagers may not fit this criteria <span id="c128" class="notranslate">?</span>), the change is as easy as logging into the router and changing, whats called, the DHCP settings. Before anything is changed, you should make a note of what the current DNS settings are. Then all you have to do is change the primary DNS server to 9.9.9.9 (4 nines &#8230; Quad9 &#8230; get it now? <span id="c103" class="notranslate">?</span>). The secondary address can be set to whatever was previously the primary address. Be sure to save the setting and reboot the router.</p>
<p>When the router comes back up, any device that connects to it (laptop, desktop, tablet, phone, smart toaster, etc.) will receive the protection of Quad9 automatically.</p>
<p>If you have any connectivity issues after the change, then simply log back into the router and put back the DNS settings under DHCP that had been there before, save the setting and reboot the router again.</p>
<p>One thing I had concerns about was performance. I previously used Google&#8217;s DNS (8.8.8.8) which was always pretty responsive. So when I tested it&#8217;s performance against Quad9&#8217;s I found that Quad9 was generally faster than Google. They are improving the service all the time as demand increases, so it should always be very quick.</p>
<p>So for me it&#8217;s a <span id="c420" class="notranslate">?</span><span id="c420" class="notranslate">?.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9 &#8211; Safer addressing on the internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Company that makes smart Teddy Bear&#8217;s leaked data.</title>
		<link>https://www.l2cybersecurity.com/smart-teddy-bear-leaked-data/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 01 Mar 2017 14:58:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Database Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=599</guid>

					<description><![CDATA[<p>It has just been reported that up to 800,000 people who owned a Smart Teddy bear made by Spiral Toys, under the CloudPets banner have had their account data stolen by hackers. Now this blog is about this particular toy, but this could easily apply to other types of &#8220;smart toy&#8221; so do read on.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/smart-teddy-bear-leaked-data/">Company that makes smart Teddy Bear&#8217;s leaked data.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-600 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/Evil-bear.jpg" alt="Evil Teddy Bear" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/Evil-bear.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/Evil-bear-150x150.jpg 150w" sizes="auto, (max-width: 300px) 100vw, 300px" />It has just been <a href="http://www.computerworld.com/article/3175466/security/smart-teddy-bears-involved-in-a-contentious-data-breach.html">reported</a> that up to 800,000 people who owned a Smart Teddy bear made by Spiral Toys, under the CloudPets banner have had their account data stolen by hackers. Now this blog is about this particular toy, but this could easily apply to other types of &#8220;smart toy&#8221; so do read on.</p>
<p>What is a &#8220;smart Teddy Bear?&#8221; I hear you ask. Apparently these toys can send and receive voice messages from children to their parents and vice versa &#8230; which is nice. ? While the voice recordings were not apparently leaked, the criminals, using the data they have stolen may be able to access the servers where the recordings are stored and download them.<span id="more-599"></span></p>
<p>The data that was stolen included e-mail addresses and &#8220;hashed&#8221; passwords. This means that the passwords were scrambled, which shows a sensible security practice by the company, as the evil doers will have difficulty in cracking a &#8220;hashed&#8221; password.</p>
<p>However, that one sensible security practice has been undone by the fact the password policy is such that a  single character is acceptable as a password. So the password &#8220;e&#8221; could be cracked by a hacker in less than a second. If the passwords were a more acceptable 12 characters long with complexity requirements, then we are looking at it taking decades or even centuries to crack a hashed password.</p>
<p>Another security fail by the company was storing the customer data on a particular type of database (MongoDB), which was publicly exposed online and required no form of authentication for somebody to access it &#8230; yes folks you read that right &#8230; if you could see the database server you could access all of it&#8217;s data. ??</p>
<p>If the evil doers had cracked some passwords (and one of the researchers in the linked article did, using the old reliable &#8220;123456&#8221;), then they could log on to the accounts and download the voice messages left by parents and children for that account.</p>
<p>The company had been notified that their MongoDB database was exposed in December, but they did not seem to take any action. The CEO of the company made some statements defending their handling of the situation and playing down any risks associated with the leak (the statements are quoted in the linked article), but frankly none of them are acceptable.</p>
<p>In fact, come May 25th 2018, if any EU citizen had an account with this crowd and they continued to adopt this laissez-faire attitude to the security of their customer&#8217;s personal data, then they will find themselves slapped with a big ol&#8217; fine from the EU under the General Data Protection Regulation (GDPR). That might get their attention. <strong>Yes you did read that right.</strong> Under the GDPR, a company, anywhere in the world, that stores/processes the personal information of an EU citizen, is governed by the GDPR and can be penalised for breaching this regulation.</p>
<p>So in conclusion, if you have any &#8220;smart&#8221; or &#8220;connected&#8221; device/toy/whatever, make sure you have a good, strong, 12 character minimum &#8211; with complexity &#8211; password for it and any on-line account associated with it. This password should be unique to that device. Come on folks you know that this is important. Your teddy bear is listening after all! ☺?</p>
<p>The post <a href="https://www.l2cybersecurity.com/smart-teddy-bear-leaked-data/">Company that makes smart Teddy Bear&#8217;s leaked data.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Internet of Evil Things continues to grow.</title>
		<link>https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 11:40:54 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=567</guid>

					<description><![CDATA[<p>The first time I saw that picture of the Dr. Evil meme, I never thought that it might be possible for the numbers to reach those nonsensical values, but if Internet connected brooms are in our future (see below), we might be in serious trouble, if the manufacturers of such devices keep ignoring the need&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/">The Internet of Evil Things continues to grow.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://3.bp.blogspot.com/-7KQHoJjbBTw/WBCU_trfElI/AAAAAAAAAcA/PF6Sx_88g9wFab3Zg5dZAqJdFfHJCnDcgCLcB/s1600/IoT%2BDevices.jpg" data-blogger-escaped-style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-7KQHoJjbBTw/WBCU_trfElI/AAAAAAAAAcA/PF6Sx_88g9wFab3Zg5dZAqJdFfHJCnDcgCLcB/s320/IoT%2BDevices.jpg" width="320" height="237" border="0" /></a></p>
<p>The first time I saw that picture of the Dr. Evil meme, I never thought that it might be possible for the numbers to reach those nonsensical values, but if Internet connected brooms are in our future (see below), we might be in serious trouble, if the manufacturers of such devices keep ignoring the need for easily configured security settings on their gear.</p>
<p>The <a href="http://en.wikipedia.org/wiki/Mirai_(malware)" data-blogger-escaped-target="_blank">Mirai Botnet</a>, which was responsible for the historic attack on <a href="http://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/" data-blogger-escaped-target="_blank">Brian Krebs website</a>, amongst others last month has grown dramatically. I came across this <a href="http://intel.malwaretech.com/botnet/mirai/?h=24" data-blogger-escaped-target="_blank">Botnet tracking website</a>, which gives details of the number of infected hosts in the Mirai Botnet a few hours ago. At that time the total number of hosts was 1,479,110. It is now showing 1,547,552 (it&#8217;ll be higher by the time you read this ?) That means on a Wednesday morning in late October, another 68,000 devices have been hacked and are ready to be used for evil purposes. It is believed that last Friday&#8217;s <a href="http://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/" data-blogger-escaped-target="_blank">massive attack on Dyn</a>, which crippled such services as Twitter, Amazon, Spotify, PayPal and Netflix, was partly as a result of the Mirai Botnet according to <a href="http://www.flashpoint-intel.com/action-analysis-mirai-botnet-attacks-dyn/" data-blogger-escaped-target="_blank">Flashpoint</a>.<span id="more-567"></span></p>
<p>Granted the total number of affected hosts is likely to be a lot lower as some of the earlier compromised devices may have been reset or disconnected from the internet either by their owners or by ISPs who detect such devices and block them.</p>
<p>Following the initial attack on Brian Krebs in September, I had <a href="http://www.l2cybersecurity.com/iot-devices-hacked/" data-blogger-escaped-target="_blank">blogged</a> encouraging everyone to change the default passwords on their IP cameras and DVRs. However, it has become apparent that a particular make of these devices has a hard coded backdoor which is not under the control of the user. <a href="http://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/" data-blogger-escaped-target="_blank">According to Brian Krebs</a>:</p>
<blockquote><p><em>The scary part about IoT products that include XiongMai’s various electronics components, Flashpoint found, was that while users could change the default credentials in the devices’ Web-based administration panel, the password is hardcoded into the device firmware and the tools needed to disable it aren’t present.</em></p></blockquote>
<p>These affected devices will need new firmware to be installed on them to remove this backdoor, but (a) there is no sign of any and (b) given the numbers involved, it would be unlikely that even 1% would get updated, and that is me being wildly optimistic. ?</p>
<p>I want to finish on a couple of light notes &#8230; as <a href="http://twitter.com/jjarmoc/status/789637654711267328" data-blogger-escaped-target="_blank">whimsically stated</a> by Jeff Jarmoc, &#8220;In a relatively short time we&#8217;ve taken a system built to resist destruction by nuclear weapons and made it vulnerable to toasters,&#8221; How very, very true. ?</p>
<p>And if you wondered what I was talking about in regards to an Internet connected broom above &#8211; this is where that came from &#8211; the Internet of Evil Things:</p>
<p><img loading="lazy" decoding="async" class="wp-image-568 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/IoET-300x264.jpg" alt="Internet of Evil Things" width="569" height="500" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/IoET-300x264.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/IoET.jpg 740w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p>The post <a href="https://www.l2cybersecurity.com/internet-of-evil-things-continues-grow/">The Internet of Evil Things continues to grow.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Details emerge about the huge internet attack last Friday.</title>
		<link>https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 24 Oct 2016 17:02:03 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=564</guid>

					<description><![CDATA[<p>I&#8217;m sure you&#8217;ve all heard about the internet attack in the US last Friday, where sites such as Twitter, Amazon, Spotify, PayPal and Netflix (amongst others) were taken offline (effectively). This was done by what is called a Distributed Denial Of Service (DDOS) attack and it targeted a company called Dyn, which provides all of&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">Details emerge about the huge internet attack last Friday.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-qxDw6fIyWyY/WA4-DQnHl4I/AAAAAAAAAbo/wGAegsvaIogW-_jR7bz_UwJYhokYXAwvgCLcB/s1600/Talkie%2BToaster.gif" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-qxDw6fIyWyY/WA4-DQnHl4I/AAAAAAAAAbo/wGAegsvaIogW-_jR7bz_UwJYhokYXAwvgCLcB/s1600/Talkie%2BToaster.gif" width="399" height="202" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">I&#8217;m sure you&#8217;ve all heard about the internet attack in the US last Friday, where sites such as Twitter, Amazon, Spotify, PayPal and Netflix (amongst others) were taken offline (effectively).</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">This was done by what is called a Distributed Denial Of Service (DDOS) attack and it targeted a company called Dyn, which provides all of those companies with a specific service. It is believed that this attack was carried out by a huge number of hacked security cameras and their associated Digital Video Recorders (DVRs), flooding the service with billions of requests which it could not handle. I talked about these hacked devices last month in <a href="http://www.l2cybersecurity.com/iot-devices-hacked/">this blog post</a>.</span></p>
</div>
<p><span id="more-564"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Since then the hacker that created the computer code to take control of the cameras, has released it to the internet, so it looks like some new bad guys may have stepped it up a bit as there was mention of between 500,000 and 1,000,000 devices being used last Friday.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">This is a very worrying situation, as that many devices could cause serious disruptions to businesses and people worldwide. There are anecdotal reports that some of these evil doers are attempting to bribe online service providers to pay them money not to launch an attack.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">There is an excellent briefing by Dr. Johannes Ullrich of the SANS Institute in the following YouTube clip. This is a little tech jargon heavy, so only watch if you are really interested in learning more about this attack.</span></p>
<p><iframe loading="lazy" title="ISC Briefing: Large DDoS Attack Against Dyn" width="500" height="281" src="https://www.youtube.com/embed/AsEzDXjyhG8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;">
<p>The post <a href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">Details emerge about the huge internet attack last Friday.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Have you any smart internet connected IoT devices in your home?</title>
		<link>https://www.l2cybersecurity.com/iot-devices-hacked/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 29 Sep 2016 14:57:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Password]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=480</guid>

					<description><![CDATA[<p>If so, you may be an unwilling accomplice to the evil doers who are attempting to disrupt the internet. Do you have any one or more of the following Internet of Things &#8211; IoT devices which you can access from outside the home, over the internet: Security Cameras or Digital Video Recorders (DVRs) Baby monitor&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/iot-devices-hacked/">Have you any smart internet connected IoT devices in your home?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://1.bp.blogspot.com/-nX96JSTK0_Q/V-0k15-bozI/AAAAAAAAAas/JusheU45vDUA7i5xbqbQineyimHbsPOEQCLcB/s1600/IoT%2BDevices.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-nX96JSTK0_Q/V-0k15-bozI/AAAAAAAAAas/JusheU45vDUA7i5xbqbQineyimHbsPOEQCLcB/s320/IoT%2BDevices.jpg" alt="IoT Devices hacked" width="320" height="237" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If so, you may be an unwilling accomplice to the evil doers who are attempting to disrupt the internet.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Do you have any one or more of the following Internet of Things &#8211; IoT devices which you can access from outside the home, over the internet:</span></p>
</div>
<ul>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Security Cameras or Digital Video Recorders (DVRs)</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Baby monitor</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart sockets</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart light bulbs</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart Thermostat</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Energy usage monitor</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Smart fridge</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Media Server</span></li>
</ul>
<p><span id="more-480"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">All of these IoT devices should have a password on them to secure them from unwanted access. However, if you have not changed the default password, or the device has a hard coded password (which cannot be changed), then it is a trivial matter for the bad guys, who have tools that are constantly scanning the internet for such IoT devices, to find and take control of your device(s) without you even realising it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: verdana, sans-serif;">They mainly do this to make use of it&#8217;s connected capabilities, though there have been other disturbing stories (more on this later). Just last week a new record was set for the biggest </span><a href="https://en.wikipedia.org/wiki/Denial-of-service_attack" data-blogger-escaped-style="font-family: verdana, sans-serif;">Distributed Denial of Service</a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: verdana, sans-serif;"> (DDOS) attack:</span></p>
</div>
<blockquote class="tr_bq" data-blogger-escaped-style="text-align: justify;"><p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Octave Klaba, the founder and CTO of French hosting company OVH, sounded the alarm on Twitter on the 22nd September when his company was hit with two concurrent DDoS attacks whose combined bandwidth reached almost 1 terabit per second. One of the two attacks peaked at 799 gigabits per second alone, making it the largest ever reported.</span></p></blockquote>
<blockquote class="tr_bq" data-blogger-escaped-style="text-align: justify;"><p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">According to Klaba, the attack targeted Minecraft servers hosted on OVH&#8217;s network, and the source of the junk traffic was a <a href="https://en.wikipedia.org/wiki/Botnet">botnet</a> made up of 145,607 hacked digital video recorders and IP cameras.</span></p></blockquote>
<blockquote class="tr_bq" data-blogger-escaped-style="text-align: justify;"><p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">With the ability to generate traffic of between 1 </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">megabit per second</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"> and 30 </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">megabits per second</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"> from every single device, this botnet is able to launch DDoS attacks that exceed 1.5 terabits per second, Klaba warned.</span></p></blockquote>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Let&#8217;s put that figure of 1 terabit per second into perspective. If you are an eir or Vodafone Broadband customer, you will have a package that can be up to 70 or 100 megabits per second. If you are a Virgin Media customer, you will have a package that would be up to 240 or 360 megabits per second. So these are megabits.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A gigabit is 1 thousand megabits. A terabit is 1 MILLION megabits! That is a LOT of crap data to be throwing at some servers that are designed to handle a fraction of that.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And the source of this crap data &#8230; nearly 146,000 digital video recorders and IP cameras that have been taken control of by the criminals.</span> Probably because nobody changed the default password and they opened access to the devices to the internet. They were then instructed to constantly send gibberish data at specific servers that the evil doers wanted to disrupt.</p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As for the other more disturbing stories, <a href="http://sfglobe.com/2016/01/06/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night/">here</a> is one about parents of a 3 year old boy discovering that some stranger had hacked into their baby monitor and was watching the night-vision video feed and talking to their child via the in-built speakers.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So the moral of the story is &#8211; put a password on every device that you have that connects to the internet in some way and disable/change any built-in accounts.</span> If you take the <a href="http://www.l2cybersecurity.com/#ourservices">Using the Internet Safely</a> training from L2 Cyber Security Solutions, then you will see how easy it is to create unique and strong passwords for all sites and applications.</p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/iot-devices-hacked/">Have you any smart internet connected IoT devices in your home?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
