Rapidly growing, insecure internet-connected devices are becoming albatross around the necks of individuals and organizations with malware authors routinely hacking them to form botnets that can be further used as weapons in DDoS and other cyber attacks.
But now finding malicious servers, hosted by attackers, that control botnet of infected machines gets a bit easier. Thanks to Shodan and
Posted in Botnet, botnet detection, Cyber Attacks, DDoS, IoT Search Engine, Malware Hunter, Search engine, Shodan, Shodan search engine | Comments (0)
Millions of messages and images of 1,700 kids were exposed by a site that – ironically! – helps parents babysit their offsprings’ mobile chats and social media doings.
Posted in Chris Vickery, COPPA, data loss, MongoDB, Security threats, Shodan, Steve Woda, uKnowKids, Vulnerability | Comments (0)