Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Angriffsziel Internet of Things
Wie sicher sind die ganzen Dinge, die mit dem Internet verbunden werden?
Im
windows.developer 2.15
ist ein Artikel über die Sicherheit des IoT erschienen.
Links
- [1] Proofpoint: "Proofpoint Uncovers Internet of Things (IoT) Cyberattack"
- [2] Dan Goodin; Ars Technica: "Is your refrigerator really part of a massive spam-sending botnet?"
- [3] Paul Thomas; Symantec: "Despite the News, Your Refrigerator is Not Yet Sending Spam"
- [4] Louis-F. Stahl; BHKW-Infothek: "Kritische Sicherheitslücke ermöglicht Fremdzugriff auf Systemregler des Vaillant ecoPOWER 1.0"
- [5] Susanne Schneidereit, Louis-F. Stahl; BHKW-Infothek: "Gefahr im Kraftwerk: Auch große BHKW sind betroffen!"
- [6] Gunnar Micheel, Susanne Schneidereit; BHKW-Infothek: "Parlamentarische Anfrage zur Sicherheit von BHKW-Steuerungen und Neues zum Sicherheitsupdate für das ecoPOWER 1.0"
- [7] Susanne Schneidereit; BHKW-Infothek: "Neue ecoPOWER 1.0 Firmware beseitigt Sicherheitslücken"
- [8] Vaillant Deutschland: "Neue VPN-Kommunikationseinheit für Ihren ecoPOWER 1.0" (PDF)
- [9] Ronald Eikenberg; Heise Online: "Kritische Schwachstelle in hunderten Industrieanlagen"
- [10] Louis-F. Stahl, Ronald Eikenberg; Heise Online: "Kritisches Sicherheitsupdate für 200.000 Industriesteuerungen"
- [11] GTV Hacker: "Google Nest: Exploiting DFU For Root"
- [12] Amir Etemadieh, CJ Heres, Mike Baker; Def Con 22: "Hack All The Things: 20 Devices in 45 Minutes"
- [13] Amir Etemadieh, CJ Heres, Mike Baker; Def Con 22: Material zu "Hack All The Things: 20 Devices in 45 Minutes" (PDF)
- [14] Grant Hernandez, Orlando Arias, Daniel Buentello, Yier Jin; Black Hat USA 2014: "Smart Nest Thermostat: A Smart Spy in Your Home"
- [15] Kashmir Hill; Forbes: "Nest Hackers Will Offer Tool To Keep The Google-Owned Company From Getting Users' Data"
- [16] Andy Greenberg; Forbes: "Researchers' Google Glass Spyware Sees What You See"
- [17] Mike Lady: Kommentar unter dem Ars-Technika-Artikel "Google Glass spyware app is cute, but not the end of the world"
- [18] Marc Rogers; Lookout Blog: "Hacking the Internet of Things for Good."
- [19] Federico Maggi, Stefano Zanero, Alberto Volpatto; Black Hat Abu Dhabi 2011: "iSnoop: How to Steal Secrets From Touchscreen Devices"
- [20] Xinwen Fu, Qinggang Yue, Zhen Ling; Black Hat USA 2014: "My Google Glass Sees Your Passwords!"
- [21] SeungJin 'Beist' Lee; Black Hat USA 2013: "Hacking, Surveilling, and Deceiving Victims on Smart TV"
- [22] Aaron Grattafiori, Josh Yavor; Black Hat USA 2013: "The Outer Limits: Hacking the Samsung Smart TV"
- [23] Aaron Grattafiori, Josh Yavor; Black Hat USA 2013: Video "The Outer Limits: Hacking the Samsung Smart TV" auf YouTube
- [24] Aaron Grattafiori, Josh Yavor; Black Hat USA 2013: Präsentation "The Outer Limits: Hacking the Samsung Smart TV" (PDF)
- [25] Dan Goodin; Ars Technica: "Philips Smart TVs wide open to Gmail cookie theft, other serious hacks"
- [26] ReVuln: Video "Having fun via WiFi with Philips SmartTV" auf Vimeo
- [27] Donato Ferrante, Luigi Auriemma; PHDays IV 2014: "SmartTV Insecurity" (PDF)
- [28] John Leyden; The Register: "Hey, does your Smart TV have a mic? Enjoy your surveillance, bro"
- [29] Felix Ingram; NCC Group Blog / Cyber Security: "Bugs in your TV"
- [30] Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman; 8th USENIX Workshop on Offensive Technologies WOOT 2014: "Green Lights Forever: Analyzing the Security of Traffic Infrastructure"
- [31] Nitesh Dhanjani: "Hacking Lightbulbs"
- [32] Nitesh Dhanjani: Video "Hacking Lightbulbs" auf YouTube
- [33] Alex Chapman; Context Security Blog: "Hacking into Internet Connected Light Bulbs"
- [34] Michael Jordon; Context Security Blog: "Hacking Canon Pixma Printers - Doomed Encryption"
- [35] Kiim Zetter; Wired: "Here’s How Easy It Could Be for Hackers to Control Your Hotel Room"
- [36] Jesus Molina; Black Hat USA 2014: "Learn How to Control Every Room at a Luxury Hotel Remotely: The Dangers of Insecure Home Automation Deployment"
- [37] David Jacoby; Securelist: "IoT: How I hacked my home - The story of a researcher who wanted to see how vulnerable he actually was"
- [38] Kashmir Hill; Forbes: "When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet"
- [39] Daniel Crowley, David Bryan, Jennifer Savage; Black Hat USA 2013: "Home Invasion v2.0 - Attacking Network-Controlled Hardware"
- [40] Daniel Crowley, Jennifer Savage, David Bryan; DefCon 21: "Home Invasion v2.0 - Attacking Network-Controlled Hardware"
- [41] Fitsec Blog: "New piece of malicious code infecting routers and IPTV’s"
- [42] ProtectYourNet: "Lightaidra - Embedded Linux Device Botnet"
- [43] Kaoru Hayashi; Symantec: "Linux Worm Targeting Hidden Devices"
- [44] Dick O'Brien; Symantec: "The Internet of Things: New Threats Emerge in a Connected World"
- [45] Kaoru Hayashi; Symantec: "IoT Worm Used to Mine Cryptocurrency"
- [46] Carsten Eilers: "Exotisches Ungeziefer"; windows.developer 11.2014
- [47] Carsten Eilers: "Microsoft Security Development Lifecycle"; windows.developer 4.2012