Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The worst IoT, smart home hacks of 2020 (so far)

5 of 6 NEXT PREV
  • Shadow IoT devices

    Shadow IoT devices

    Researchers warned at the start of 2020 that the emergence of 'shadow IoT devices' -- such as employee devices connected to corporate networks without the knowledge of IT teams -- are putting organizations at serious risk. 

    Fitness trackers, smartwatches, and medical devices are only some of many IoT endpoints that can be exploited to gain a foothold into corporate networks.  

    Via: ZDNet

    Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Smart building access systems

    Smart building access systems

    In February, an alert was issued that warned of a vulnerability in over 2,300 smart building access systems that was being exploited by attackers to launch DDoS attacks. Linear eMerge E3 systems were being targeted.

    Via: ZDNet

    Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Smart cars

    Smart cars

    McAfee said in February that "model hacking" can be used to compromise the machine learning (ML) and intelligent systems in modern vehicles. A study into the security risks of smart vehicles revealed it was possible to compromise the MobilEye camera system, used in many car models today. 

    Via: McAfee

    Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Smart home hubs

    Smart home hubs

    ESET, too, documented how other home IoT devices -- in this case, Fibaro, Homematic, and eLAN hubs used to connect and control full IoT setups -- were exploitable for nefarious purposes.  

    The severe vulnerabilities included unauthenticated, remote code execution, full device hijacking, and Man-in-the-Middle (MitM) attacks.

    Via: ESET

    Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Kaiji botnet

    Kaiji botnet

    In early May, cybersecurity researchers revealed a new form of malware, Kaiji, that is specifically targeting IoT devices and Linux servers. The malware is compromising devices via brute-force attacks to rope them into a botnet that has the capability to perform six different types of DDoS attacks.

    Via: ZDNet

    Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

  • Supercomputers

    Supercomputers

    While not your standard home IoT setup, high-performance supercomputing systems across the UK, Germany, and Switzerland were targeted and infected with cryptocurrency mining malware in May, forcing operators to close down numerous clusters.

    Via: ZDNet

    Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

    Caption by: Charlie Osborne

5 of 6 NEXT PREV
Charlie Osborne

By Charlie Osborne | June 2, 2020 -- 05:00 GMT (22:00 PDT) | Topic: Security

  • Shadow IoT devices
  • Smart building access systems
  • Smart cars
  • Smart home hubs
  • Kaiji botnet
  • Supercomputers

Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.

Read More Read Less

Kaiji botnet

In early May, cybersecurity researchers revealed a new form of malware, Kaiji, that is specifically targeting IoT devices and Linux servers. The malware is compromising devices via brute-force attacks to rope them into a botnet that has the capability to perform six different types of DDoS attacks.

Via: ZDNet

Published: June 2, 2020 -- 05:00 GMT (22:00 PDT)

Caption by: Charlie Osborne

5 of 6 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | June 2, 2020 -- 05:00 GMT (22:00 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums