• chevron_right

      8 attaques par jour : pourquoi les hackers raffolent des ampoules et autres objets connectés [Sponso]

      news.movim.eu / Numerama · Sunday, 18 February - 07:30

    Cet article a été réalisé en collaboration avec Bitdefender

    Enceintes, ampoules, routeurs et même lave-linges, les objets connectés font désormais partie de notre quotidien. Grands collecteurs de données, ces appareils apprennent de vos habitudes de vie. À ce titre, ils méritent d’être sécurisés. On vous explique comment mieux protéger votre vie privée.

    Cet article a été réalisé en collaboration avec Bitdefender

    Il s’agit d’un contenu créé par des rédacteurs indépendants au sein de l’entité Humanoid xp. L’équipe éditoriale de Numerama n’a pas participé à sa création. Nous nous engageons auprès de nos lecteurs pour que ces contenus soient intéressants, qualitatifs et correspondent à leurs intérêts.

    En savoir plus

    • chevron_right

      The Cyber Trust Mark is a voluntary IoT label coming in 2024. What does it mean?

      news.movim.eu / ArsTechnica · Wednesday, 19 July, 2023 - 18:56 · 1 minute

    The range of US Cyber Trust Mark colors.

    Enlarge / The U.S. Cyber Trust Mark logos, which may or may not have an assigned order at the moment. Which one most says "secure" to you? (credit: Federal Communications Commission)

    The goal of the new US Cyber Trust Mark , coming voluntarily to Internet of Things (IoT) devices by the end of 2024, is to keep people from having to do deep research before buying a thermostat, sprinkler controller, or baby monitor.

    If you see a shield with a microchip in it that's a certain color, you'll know something by comparing it to other shields. What exactly that shield will mean is not yet decided. The related National Institute of Standards and Technology report suggests it will involve encrypted transmission and storage, software updates, and how much control a buyer has over passwords and data retention. But the only thing really new since the initiative's October 2022 announcement is the look of the label, a slightly more firm timeline, and more input and discussion meetings to follow.

    At the moment, the Mark exists as a Notice of Proposed Rulemaking (NPRM) at the Federal Communications Commission. The FCC wants to hear from stakeholders about the scope of devices that can be labeled and which entity should oversee the program, verify the standards, and handle consumer education.

    Read 8 remaining paragraphs | Comments

    • chevron_right

      A Snap-based, containerized Ubuntu desktop could be offered in 2024

      news.movim.eu / ArsTechnica · Wednesday, 31 May, 2023 - 15:56

    Snap apps laid out in a grid

    Enlarge / Some of the many Snap apps available in Ubuntu's Snap Store, the place where users can find apps and Linux enthusiasts can find deep-seated disagreement. (credit: Canonical )

    Ubuntu Core has existed since 2014, providing a fully containerized, immutable Linux distribution aimed at Internet of Things (IoT) and edge computing applications.

    That kind of system, based on Ubuntu distributor Canonical's own Snap package format, could be available for desktop users with the next Ubuntu Long Term Support release, according to an Ubuntu mobile engineer. Pointing to a comment in one of his prior posts , Ubuntu blogger Joey Sneddon suggests that an optional " All-Snap Ubuntu Desktop " will be available with Ubuntu 24.04 in April 2024.

    It's important to note that a Snap-based Ubuntu would seemingly be an alternate option, not the primary desktop offered. DEB-based Ubuntu would almost certainly remain the mainstream release.

    Read 5 remaining paragraphs | Comments

    • chevron_right

      Wemo won’t fix Smart Plug vulnerability allowing remote operation

      news.movim.eu / ArsTechnica · Tuesday, 16 May, 2023 - 20:35 · 1 minute

    Wemo Smart Plug V2

    Enlarge / This guy? This guy can be tricked into offering remote control if you give it a long name. But he's too old for his maker to care much about that.

    I once co-owned a coworking space. The space had doors with magnetic locks, unlocked by a powered relay. My partners and I realized that, if we could switch power to the system on and off, we could remotely control the door lock. One of us had a first-generation Wemo plug, so we hooked that up, and then the programmer among us set up a script that, passing Python commands over the local network, switched the door lock open and closed.

    Sometimes it would occur to me that it was kind of weird that, without authentication, you could just shout Python commands at a Wemo and it would toggle. I'm having the same feeling today about a device that's one generation newer and yet also possesses fatal flaws.

    IoT security research firm Sternum has discovered ( and disclosed ) a buffer overflow vulnerability in the Wemo Mini Smart Plug V2 . The firm's blog post is full of interesting details about how this device works (and doesn't), but a key takeaway is that you can predictably trigger a buffer overflow by passing the device a name longer than its 30-character limit—a limit enforced solely by Wemo's own apps—with third-party tools. Inside that overflow you could inject operable code. If your Wemo is connected to the wider Internet, it could be compromised remotely.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Network-watching gadget Monitor-IO chooses a graceful, owner-friendly death

      news.movim.eu / ArsTechnica · Tuesday, 11 April, 2023 - 15:07 · 1 minute

    Monitor-IO, amidst various geeky things

    Enlarge / The Monitor-IO in its natural habitat, glowing green to let you know that everything is copacetic with the network to which it's connected. (credit: Jim Salter)

    Monitor-IO was a gadget that did one thing: live near a router and tell you how its network is doing. It did this both with detailed reports you could access from the local network and with a screen that glowed one of three colors: green for good, purple for problems, and red for dead. It could replace, or at least augment, typing a bunch of IP addresses into a browser and waiting for them to time out.

    We liked the device when we reviewed it in August 2018 , despite our broad understanding of it as a "butter-passing robot," a device that relays information you could otherwise find out on your own. It had, beyond color-coded awareness, "obvious technical chops and real, careful attention to detail" in how it measured and what it could report. However, we also noted that the $100 price made sense for a small business but "might be a bit steep" for a household on a tight budget.

    Monitor-IO seems to have run out of people willing to pay for better network awareness. In an "End-of-service" notice posted on its site , the company cites "rising costs and supply chain issues," among other "numerous headwinds." Faced with no better option, Monitor-IO is shutting down its business and monitoring service on April 15, 2023. (Support will be offered through May 30, 2023.)

    Read 5 remaining paragraphs | Comments

    • chevron_right

      Open garage doors anywhere in the world by exploiting this “smart” device

      news.movim.eu / ArsTechnica · Tuesday, 4 April, 2023 - 22:30 · 1 minute

    woman inside the car using mobile phone to open garage. woman entering pin into smartphone while unlocking garage.

    Enlarge (credit: Getty Images)

    A market-leading garage door controller is so riddled with severe security and privacy vulnerabilities that the researcher who discovered them is advising anyone using one to immediately disconnect it until they are fixed.

    Each $80 device used to open and close garage doors and control home security alarms and smart power plugs employs the same easy-to-find universal password to communicate with Nexx servers. The controllers also broadcast the unencrypted email address, device ID, first name, and last initial corresponding to each one, along with the message required to open or shut a door or turn on or off a smart plug or schedule such a command for a later time.

    Immediately unplug all Nexx devices

    The result: Anyone with a moderate technical background can search Nexx servers for a given email address, device ID, or name and then issue commands to the associated controller. (Nexx controllers for home security alarms are susceptible to a similar class of vulnerabilities.) Commands allow the opening of a door, turning off a device connected to a smart plug, or disarming an alarm. Worse still, over the past three months, personnel for Texas-based Nexx haven’t responded to multiple private messages warning of the vulnerabilities.

    Read 14 remaining paragraphs | Comments

    • chevron_right

      Go ahead and unplug this door device before reading. You’ll thank us later.

      news.movim.eu / ArsTechnica · Thursday, 9 March, 2023 - 17:34 · 1 minute

    The Akuvox E11

    Enlarge / The Akuvox E11 (credit: Akuvox)

    The Akuvox E11 is billed as a video door phone, but it’s actually much more than that. The network-connected device opens building doors, provides live video and microphone feeds, takes a picture and uploads it each time someone walks by, and logs each entry and exit in real time. The Censys device search engine shows that roughly 5,000 such devices are exposed to the Internet, but there are likely many more that Censys can’t see for various reasons.

    It turns out that this omnipotent, all-knowing device is riddled with holes that provide multiple avenues for putting sensitive data and powerful capabilities into the hands of threat actors who take the time to analyze its inner workings. That’s precisely what researchers from security firm Claroty did. The findings are serious enough that anyone who uses one of these devices in a home or building should pause reading this article, disconnect their E11 from the Internet, and assess where to go from there.

    The 13 vulnerabilities found by Claroty include a missing authentication for critical functions, missing or improper authorization, hard-coded keys that are encrypted using accessible rather than cryptographically hashed keys, and the exposure of sensitive information to unauthorized users. As bad as the vulnerabilities are, their threat is made worse by the failure of Akuvox —a China-based leading supplier of smart intercom and door entry systems—to respond to multiple messages from Claroty, the CERT coordination Center, and Cybersecurity and Infrastructure Security Agency over a span of six weeks. Claroty and CISA publicly published their findings on Thursday here and here .

    Read 14 remaining paragraphs | Comments

    • chevron_right

      Que signifie eSIM ?

      news.movim.eu / Numerama · Sunday, 5 February, 2023 - 13:05

    Une eSIM est une carte SIM directement embarquée dans un terminal numérique, qui ne demande donc ni d’être ajoutée ni d’être changée. Elle s’active et se gère à distance. [Lire la suite]

    Abonnez-vous aux newsletters Numerama pour recevoir l’essentiel de l’actualité https://www.numerama.com/newsletter/