
Insights into IoT and cybersecurity from experts at NewSky Security.
👩💻 👨💻 Recent Blogs
🔍💡 IoT Threat Research
👩💻 👨💻 All Blogs
1-100 of 251 results
- 
Factory Reset Vulnerability in Netgear ARLO – NewSky Security
- Hacking
 - IoT
 - PoC
 - Security
 
Update: CVE-2016–10115 and CVE-2016–10116 have been enlisted by MITRE. Refer to the following CVE entries:… - 
Sonorousness ransomware unmasked
- Android
 - Malware
 
Sonorousness: the latest ransomware of the S-Locker family Recently, NewSky Security received a threat sample… - 
What is the acronym OWASP?
- General
 - IoT
 
When reading articles about mobile security, you may have come across the acronym OWASP and… - 
Wireless SecurityCam
- Security
 
NETGEAR ARLO Q Stream live video 24/7 and watch past recordings in sharp 1080p HD… - 
Wireless Routers
- Security
 
Linksys WRT1900AC The professional-grade WRT1900ACS Dual-Band Gigabit Wi-Fi Router from Linksys offers speeds up to… - 
Wi-Fi Lighting
- Security
 
LIFX The LIFX Original is a Wi-Fi Smart LED White Light Bulb that gives you… - 
Smart Irrigation Controllers
- Security
 
Aifro WaterEco Aifro WaterEco is a smart garden sprinkler system with a 7-inch touch screen…. - 
Smart Outlets
- Security
 
ConnectSense Smart Outlet With the Connect Sense Smart Outlet, controlling and monitoring the power usage… - 
Smart Door Locks/Security Camera
- Security
 
Netatmo Welcome This indoor security camera features built-in facial recognition to help keep your family… - 
Smart Device Security
- Security
 
Dojo Dojo is constantly analyzing all the network traffic within the home network and enforces… - 
Medical & Fitness
- Security
 
AdhereTech AdhereTech makes smart, wireless pill bottles that help ensure that patients are taking their… - 
Jelly Bean
- Security
 
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:… - 
Infostealer.A
- Security
 
AppRisk Coverage: YesType: TrojanOWASP: M4: Unintended Data LeakageAliases: Trojan:Android/InfoStealer Platform: AndroidFile size (bytes): N/AFilename: N/AApp… - 
Gingerbread
- Security
 
AppRisk Coverage: Not ApplicableType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1… - 
Ice Cream Sandwich
- Security
 
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:… - 
ExymemBrk.A
- Security
 
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/ExymemBrk.A Platform: AndroidFile size (bytes): N/AFilename: N/AApp… - 
DroidKungfu.A
- Security
 
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Trojan: Android/DroidKungFu.A Backdoor.AndroidOS.KungFu Android/DroidFu Trojan:AndroidOS/DroidKrungFu.A Andr/KongFu-A AndroidOS_DROIDKUNGFU… - 
DiutesEx.A
- Security
 
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/DiutesEx.A Platform: AndroidFile size (bytes): N/AFilename: N/AApp… - 
DiutesEx.B
- Security
 
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/DiutesEx.B Platform: AndroidFile size (bytes): N/AFilename: N/AApp… - 
CVE-2015-6611
- Security
 
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Information Disclosure Vulnerabilities in Mediaserver… - 
CVE-2015-6610
- Security
 
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Elevation of Privilege Vulnerability in… - 
CVE-2015-7888
- Security
 
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Samsung Galaxy S6 Directory Traversal… - 
CVE-2015-6608
- Security
 
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Remote Code Execution Vulnerabilities in… - 
Temperature, Humidity, and Energy Monitoring
- Security
 
EcoBee3 Ordinary thermostats only read the temperature in one room, but are supposed to deliver… - 
Your Device Is My Miner: How Hackers Steal Your Cryptocurrency
- Security
 
Since bitcoin hit its record high value of $20,000 in 2017, more and more individuals… - 
Up for grabs: US Government Lexmark printers (and thousands of others) exposed on the Internet with no security
- Security
 
We observed that more than one thousand Lexmark printers have no password. Some of these… - 
NewSky Security Presenting IoT Security Research at AVAR 2017 Conference | by NewSky Security | NewSky Security
- Security
 
Ankit Anubhav shared his research in the IoT threat landscape in AVAR 2017 As the… - 
Agile QBot Variant Adds NbotLoader Netgear Bug in Its New Update
- Security
 
Introduction QBot, also known as Bashlite, is one of the most widely known IoT Botnet… - 
Beyond NBotLoader. A system is only as secure as its…
- Security
 
Beyond NBotLoader A system is only as secure as its weakest link, and the same… - 
Case Study: Hacking Smart Lock Security
- Security
 
Update: This case study was presented at the CanSecWest 2016 conference held in Vancouver, British… - 
Fake Adobe website delivers BetaBot | by NewSky Security | NewSky Security
- Security
 
Introduction The key to a successful cyberattack is deception. In most cases, the initial attack… - 
DoubleDoor: IoT Botnet bypasses firewall as well as modem security using two backdoor exploits
- Security
 
Introduction Within two years, IoT attacks have seen rapid evolution. We now see that IoT… - 
Script Kiddie Nightmare: IoT Attack Code Embedded with Backdoor
- Security
 
Introduction The IoT threat landscape is proving to be the fastest to evolve, with attacks… - 
A Huge Wave of IoT Zombies Coming – NewSky Security
- Security
 
Introduction Evolution is an integral part when it comes to malware, as attackers need to… - 
US Government Site Unwittingly Hosting Malware – NewSky Security
- Security
 
Introduction: With ever improving spam filters and blacklisting employed as security solutions, it is becoming… - 
Ashmembrk.A
- Security
 
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: CVE-2011-1149 Platform: AndroidFile size (bytes): Filename: App… - 
Certificate Verification Vulnerability
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… - 
CVE-2011-1149
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Ashmembrk.A Platform: AndroidFile size (bytes):… - 
CVE-2013-6282
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… - 
CVE-2014-3153
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Towelroot bug Platform: AndroidFile size… - 
CVE-2014-4943
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):… - 
CVE-2015-1474
- Security
 
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… - 
CVE-2015-1528
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Elevation of Privilege Vulnerability in… - 
CVE-2015-3636
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):… - 
CVE-2015-3825
- Security
 
Severity Level: High AppRisk Coverage: Yes Type: Vulnerability OWASP: M4: Unintended Data Leakage Aliases: OpenSSLX509Certificate… - 
Health & Fitness
- Security
 
All the App Icons from this website are from Google Play Store No.1: Fitbit … - 
Garage Door Openers
- Security
 
ChamberlainMyQ You don’t have to buy a new garage door opener in order to control… - 
 - 
MempoDroid.A
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via… - 
MempoDroid.C
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via… - 
Weak Random Number Generator
- Security
 
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… - 
Hacker Fail: IoT botnet command and control server accessible via default credentials
- Security
 
In an irony of epic proportions, we observed that an IoT botnet variant, Owari, which… - 
Information Disclosure Vulnerability CVE-2018-7900 Makes It Easy for Attackers to Find Huawei Devices at Risk | by NewSky Security | NewSky Security
- Security
 
Introduction: Not All Attack Vectors are Created Equal By 2018, it is commonplace for… - 
Cryptocurrency Mining Hacks: How Thefts Steal Bitcoin and Ethereum
- Security
 
Over the last year, cryptocurrency broke into mainstream with its dramatic highs and lows. With… - 
SaaS Security Essentials for Protecting Cloud-Based Applications
- Uncategorized
 
SaaS security protects your cloud-based applications and keeps your business data safe from threats and… - 
ARS Security Freeze: How to Protect Your Credit from Unauthorized Access
- Uncategorized
 
If you want to protect your credit report from unwanted access, an ARS security freeze… - 
trwho.com security: Key Measures to Protect Your Data
- Uncategorized
 
When you shop online, the security of your information matters. Trwho.com uses SSL Security Encoding to… - 
Your Organization Has a New Requirement for Annual Security Training – 1300: What You Need to Know
- Uncategorized
 
Many organizations are now asking employees to complete annual security training. This new requirement helps protect… - 
Internet No Internet Secured Troubleshooting Causes and Solutions
- Uncategorized
 
If you see a “No Internet, Secured” message on your Windows computer, it means you… - 
How to Send a Secure Email in Outlook: Step-by-Step Guide for Enhanced Privacy
- Uncategorized
 
Sending secure emails in Outlook is essential to protect your private information from being intercepted… - 
What to do if your SSN is on the Dark Web
- Hacking
 
Finding out that your Social Security number is on the dark web can be stressful…. - 
security@facebookmail How to Identify Legitimate Emails and Avoid Scams
- Security
 
If you’ve ever received an email from security@facebookmail.com, you might wonder if it’s truly from Facebook… - 
How Attackers Run Malware With Nothing More Than a Script (and How You Can Stop Them)
- Hacking
 
You lock down USB ports, patch your operating systems, and ban random executables—yet attackers still… - 
AfterDarkMode Malware: Why You Must Avoid This “Dark-Theme” App and How to Recover if You Already Installed It
- Malware
 
You’re scrolling your favorite forum late at night when someone shares a slick-looking “AfterDarkMode” download…. - 
Who will receive $1800 Social Security Payment in 2025?
- General
 
 You may have heard friends, neighbors, or social-media pundits talk about an “$1,800 Social… - 
Kernel Security Check Failure Causes and Effective Troubleshooting Methods
- Security
 
The kernel security check failure is a common Windows error that causes the system to… - 
ecrypto1.com Crypto Security: Comprehensive Analysis and Best Practices
- privacy
 
When it comes to protecting your digital assets, ecrypto1.com offers a strong and layered approach… - 
Cash App Security Settlement Explained: Key Details and Impact
- smart
 
The Cash App security settlement offers users affected by data breaches a chance to receive… - 
Network Security Key Best Practices for Stronger Wireless Protection
- privacy
 
A network security key is the password that protects a wireless network from unauthorized access…. - 
Network Security Key Essential Guide to Safe Wireless Connections
- General
 
A network security key is the password used to connect devices to a Wi-Fi network. It… - 
Apple security alert scam warning and how to protect yourself
- General
 
Many users see a sudden pop-up claiming an “Apple Security Alert” and panic. These messages… - 
Security Today Magazine Layered Hospital Security: Modern Strategies for Protecting Healthcare Facilities
- General
 
Layered security in hospitals is becoming more important as threats to patient and staff safety… - 
Power Over Ethernet Cameras for Video Surveillance Enhancing Security with Efficient Connectivity
- IOS
 
Power over Ethernet (PoE) cameras are a popular choice for video surveillance because they simplify… - 
What Is Composite Risk Management? (Your Complete Guide to CRM Process and Implementation)
- General
 
You’re leading a project with multiple moving parts—tight deadlines, budget constraints, new technology, and a… - 
What Does “GNG” Mean on TikTok and Instagram? (Your Guide to This Trending Abbreviation)
- General
 
You’re scrolling through TikTok comments or Instagram DMs when you spot it again: “GNG.” Maybe… - 
How Much Does a Private Investigator Cost in 2025? (Complete Pricing Guide and What You Get for Your Money)
- Private Investigations
 
You suspect your business partner is hiding assets, your spouse might be cheating, or you… - 
The Hidden Risks of Hiring a Private Investigator in 2025 (What Could Go Wrong and How to Protect Yourself)
- Private Investigations
 
You’re convinced you need a private investigator. Maybe you suspect infidelity, need to locate a… - 
Are Private Investigators Legal? What You Need to Know About PI Laws and Regulations
- Private Investigations
 
When most people think about private investigators, images from movies and TV shows come to… - 
Ubuntu Root Password: Your Complete Guide to Understanding and Managing Root Access
- General
 
Ubuntu users often find themselves confused when trying to perform administrative tasks, wondering what the… - 
Kyocera Default Passwords Command Centre
Kyocera machine passwords: General rules 1. Most machines have a username and password to enter… - 
Hikvision Login: Default IP, Username, Password, Port
- Security
 
Hikvision is a very popular brand of surveillance cameras and security solutions. When setting up a… - 
IoT App Development in 2025: A How-To Guide for Startups and SMBs
- General
 
As someone who has been deeply involved in the IoT space for years and has… - 
IoT Security Concerns in 2025: What Every Business Leader Needs to Know
- IoT
 
After spending years in the trenches of IoT security at NewSky Security, I’ve witnessed firsthand… - 
IoT Remote Monitoring in 2025: The Game-Changer Every Business Leader Must Understand
- IOS
 
Having spent the better part of the last decade building and deploying IoT remote monitoring… - 
Cyber Security and the Internet of Things (IoT): Our Research Findings and Emerging Concerns
- IoT
 
As Internet of Things (IoT) technology becomes more closely integrated in everyday systems, lifestyles and… 







