close
    • chevron_right

      Go ahead and unplug this door device before reading. You’ll thank us later.

      news.movim.eu / ArsTechnica · Thursday, 9 March, 2023 - 17:34 · 1 minute

    The Akuvox E11

    Enlarge / The Akuvox E11 (credit: Akuvox)

    The Akuvox E11 is billed as a video door phone, but it’s actually much more than that. The network-connected device opens building doors, provides live video and microphone feeds, takes a picture and uploads it each time someone walks by, and logs each entry and exit in real time. The Censys device search engine shows that roughly 5,000 such devices are exposed to the Internet, but there are likely many more that Censys can’t see for various reasons.

    It turns out that this omnipotent, all-knowing device is riddled with holes that provide multiple avenues for putting sensitive data and powerful capabilities into the hands of threat actors who take the time to analyze its inner workings. That’s precisely what researchers from security firm Claroty did. The findings are serious enough that anyone who uses one of these devices in a home or building should pause reading this article, disconnect their E11 from the Internet, and assess where to go from there.

    The 13 vulnerabilities found by Claroty include a missing authentication for critical functions, missing or improper authorization, hard-coded keys that are encrypted using accessible rather than cryptographically hashed keys, and the exposure of sensitive information to unauthorized users. As bad as the vulnerabilities are, their threat is made worse by the failure of Akuvox —a China-based leading supplier of smart intercom and door entry systems—to respond to multiple messages from Claroty, the CERT coordination Center, and Cybersecurity and Infrastructure Security Agency over a span of six weeks. Claroty and CISA publicly published their findings on Thursday here and here .

    Read 14 remaining paragraphs | Comments

    • chevron_right

      XMPP for IoT: Visualisation of Meteorological Live Data for Renewable Energy

      pubsub.movim.eu / berlin-xmpp-meetup · Tuesday, 11 May, 2021 - 15:29 edit

    Dan and Tim will present a beautiful web application based on Strophe.js and Flot.js to visualise live measuremen data transmitted via XMPP PubSub/PEP. This is not about instant messaging at all, this is IoT, but security included.

    When? Wednesday, 2021-05-12 18:00 CEST (always 2ⁿᵈ Wednesday of every month)

    Where? Online, via our MUC (xmpp:berlin-meetup@conference.conversations.im?join). A Jitsi video conference will be announced there.

    See you then!

    #jabber #berlin #meetup #community #xmpp #iot #webapplication #javascript #strophejs #flotjs #pubsub #pep #security #renewableenergy

    • chevron_right

      How a hacker turned a $250 coffee maker into ransom machine

      Dan Goodin · news.movim.eu / ArsTechnica · Saturday, 26 September, 2020 - 14:58

    With the name Smarter, you might expect a network-connected kitchen appliance maker to be, well, smarter than companies selling conventional appliances. But in the case of the Smarter’s Internet-of-things coffee maker, you’d be wrong.

    As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of the $250 devices to see what kinds of hacks he could do. After just a week of effort, the unqualified answer was: quite a lot. Specifically, he could trigger the coffee maker to turn on the burner, dispense water, spin the bean grinder, and display a ransom message, all while beeping repeatedly. Oh, and by the way, the only way to stop the chaos was to unplug the power cord. Like this:

    What a hacked coffee maker looks like

    “It’s possible,” Hron said in an interview. “It was done to point out that this did happen and could happen to other IoT devices. This is a good example of an out-of-the-box problem. You don't have to configure anything. Usually, the vendors don’t think about this.”

    Read 22 remaining paragraphs | Comments

    index?i=BWgg6v7sQGI:AR1ZW37nlPg:V_sGLiPBpWUindex?i=BWgg6v7sQGI:AR1ZW37nlPg:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA