
Insights into IoT and cybersecurity from experts at NewSky Security.
👩💻 👨💻 Recent Blogs
🔍💡 IoT Threat Research
👩💻 👨💻 All Blogs
1-100 of 176 results
-
Factory Reset Vulnerability in Netgear ARLO – NewSky Security
- Hacking
- IoT
- PoC
- Security
Update: CVE-2016–10115 and CVE-2016–10116 have been enlisted by MITRE. Refer to the following CVE entries:… -
Sonorousness ransomware unmasked
- Android
- Malware
Sonorousness: the latest ransomware of the S-Locker family Recently, NewSky Security received a threat sample… -
What is the acronym OWASP?
- General
- IoT
When reading articles about mobile security, you may have come across the acronym OWASP and… -
Wireless SecurityCam
- Security
NETGEAR ARLO Q Stream live video 24/7 and watch past recordings in sharp 1080p HD… -
Wireless Routers
- Security
Linksys WRT1900AC The professional-grade WRT1900ACS Dual-Band Gigabit Wi-Fi Router from Linksys offers speeds up to… -
Wi-Fi Lighting
- Security
LIFX The LIFX Original is a Wi-Fi Smart LED White Light Bulb that gives you… -
Smart Outlets
- Security
ConnectSense Smart Outlet With the Connect Sense Smart Outlet, controlling and monitoring the power usage… -
Smart Irrigation Controllers
- Security
Aifro WaterEco Aifro WaterEco is a smart garden sprinkler system with a 7-inch touch screen…. -
Smart Door Locks/Security Camera
- Security
Netatmo Welcome This indoor security camera features built-in facial recognition to help keep your family… -
Smart Device Security
- Security
Dojo Dojo is constantly analyzing all the network traffic within the home network and enforces… -
Medical & Fitness
- Security
AdhereTech AdhereTech makes smart, wireless pill bottles that help ensure that patients are taking their… -
Jelly Bean
- Security
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:… -
Infostealer.A
- Security
AppRisk Coverage: YesType: TrojanOWASP: M4: Unintended Data LeakageAliases: Trojan:Android/InfoStealer Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
Gingerbread
- Security
AppRisk Coverage: Not ApplicableType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1… -
Ice Cream Sandwich
- Security
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:… -
ExymemBrk.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/ExymemBrk.A Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
DroidKungfu.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Trojan: Android/DroidKungFu.A Backdoor.AndroidOS.KungFu Android/DroidFu Trojan:AndroidOS/DroidKrungFu.A Andr/KongFu-A AndroidOS_DROIDKUNGFU… -
DiutesEx.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/DiutesEx.A Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
DiutesEx.B
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/DiutesEx.B Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
CVE-2015-6611
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Information Disclosure Vulnerabilities in Mediaserver… -
CVE-2015-7888
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Samsung Galaxy S6 Directory Traversal… -
CVE-2015-6610
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Elevation of Privilege Vulnerability in… -
CVE-2015-6608
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Remote Code Execution Vulnerabilities in… -
Temperature, Humidity, and Energy Monitoring
- Security
EcoBee3 Ordinary thermostats only read the temperature in one room, but are supposed to deliver… -
Your Device Is My Miner: How Hackers Steal Your Cryptocurrency
- Security
Since bitcoin hit its record high value of $20,000 in 2017, more and more individuals… -
Up for grabs: US Government Lexmark printers (and thousands of others) exposed on the Internet with no security
- Security
We observed that more than one thousand Lexmark printers have no password. Some of these… -
NewSky Security Presenting IoT Security Research at AVAR 2017 Conference | by NewSky Security | NewSky Security
- Security
Ankit Anubhav shared his research in the IoT threat landscape in AVAR 2017 As the… -
Beyond NBotLoader. A system is only as secure as its…
- Security
Beyond NBotLoader A system is only as secure as its weakest link, and the same… -
Agile QBot Variant Adds NbotLoader Netgear Bug in Its New Update
- Security
Introduction QBot, also known as Bashlite, is one of the most widely known IoT Botnet… -
Fake Adobe website delivers BetaBot | by NewSky Security | NewSky Security
- Security
Introduction The key to a successful cyberattack is deception. In most cases, the initial attack… -
Case Study: Hacking Smart Lock Security
- Security
Update: This case study was presented at the CanSecWest 2016 conference held in Vancouver, British… -
DoubleDoor: IoT Botnet bypasses firewall as well as modem security using two backdoor exploits
- Security
Introduction Within two years, IoT attacks have seen rapid evolution. We now see that IoT… -
Script Kiddie Nightmare: IoT Attack Code Embedded with Backdoor
- Security
Introduction The IoT threat landscape is proving to be the fastest to evolve, with attacks… -
US Government Site Unwittingly Hosting Malware – NewSky Security
- Security
Introduction: With ever improving spam filters and blacklisting employed as security solutions, it is becoming… -
A Huge Wave of IoT Zombies Coming – NewSky Security
- Security
Introduction Evolution is an integral part when it comes to malware, as attackers need to… -
Certificate Verification Vulnerability
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
Ashmembrk.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: CVE-2011-1149 Platform: AndroidFile size (bytes): Filename: App… -
CVE-2011-1149
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Ashmembrk.A Platform: AndroidFile size (bytes):… -
CVE-2013-6282
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
CVE-2014-4943
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):… -
CVE-2014-3153
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Towelroot bug Platform: AndroidFile size… -
CVE-2015-1528
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Elevation of Privilege Vulnerability in… -
CVE-2015-1474
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
CVE-2015-3636
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):… -
CVE-2015-3825
- Security
Severity Level: High AppRisk Coverage: Yes Type: Vulnerability OWASP: M4: Unintended Data Leakage Aliases: OpenSSLX509Certificate… -
Health & Fitness
- Security
All the App Icons from this website are from Google Play Store No.1: Fitbit … -
Garage Door Openers
- Security
ChamberlainMyQ You don’t have to buy a new garage door opener in order to control… -
-
MempoDroid.A
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via… -
MempoDroid.C
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via… -
Weak Random Number Generator
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
Hacker Fail: IoT botnet command and control server accessible via default credentials
- Security
In an irony of epic proportions, we observed that an IoT botnet variant, Owari, which… -
Information Disclosure Vulnerability CVE-2018-7900 Makes It Easy for Attackers to Find Huawei Devices at Risk | by NewSky Security | NewSky Security
- Security
Introduction: Not All Attack Vectors are Created Equal By 2018, it is commonplace for… -
Cryptocurrency Mining Hacks: How Thefts Steal Bitcoin and Ethereum
- Security
Over the last year, cryptocurrency broke into mainstream with its dramatic highs and lows. With… -
SaaS Security Essentials for Protecting Cloud-Based Applications
- Uncategorized
SaaS security protects your cloud-based applications and keeps your business data safe from threats and… -
You’ve Been Blocked by Network Security What It Means and How to Regain Access
- Uncategorized
If you see a message saying “you’ve been blocked by network security,” it means your… -
ARS Security Freeze: How to Protect Your Credit from Unauthorized Access
- Uncategorized
If you want to protect your credit report from unwanted access, an ARS security freeze… -
trwho.com security: Key Measures to Protect Your Data
- Uncategorized
When you shop online, the security of your information matters. Trwho.com uses SSL Security Encoding to… -
Your Organization Has a New Requirement for Annual Security Training – 1300: What You Need to Know
- Uncategorized
Many organizations are now asking employees to complete annual security training. This new requirement helps protect… -
Internet No Internet Secured Troubleshooting Causes and Solutions
- Uncategorized
If you see a “No Internet, Secured” message on your Windows computer, it means you… -
How to Send a Secure Email in Outlook: Step-by-Step Guide for Enhanced Privacy
- Uncategorized
Sending secure emails in Outlook is essential to protect your private information from being intercepted… -
What to do if your SSN is on the Dark Web
- Hacking
Finding out that your Social Security number is on the dark web can be stressful…. -
security@facebookmail How to Identify Legitimate Emails and Avoid Scams
- Security
If you’ve ever received an email from security@facebookmail.com, you might wonder if it’s truly from Facebook… -
How Attackers Run Malware With Nothing More Than a Script (and How You Can Stop Them)
- Hacking
You lock down USB ports, patch your operating systems, and ban random executables—yet attackers still… -
AfterDarkMode Malware: Why You Must Avoid This “Dark-Theme” App and How to Recover if You Already Installed It
- Malware
You’re scrolling your favorite forum late at night when someone shares a slick-looking “AfterDarkMode” download…. -
Who will receive $1800 Social Security Payment in 2025?
- General
You may have heard friends, neighbors, or social-media pundits talk about an “$1,800 Social… -
Kernel Security Check Failure Causes and Effective Troubleshooting Methods
- Security
The kernel security check failure is a common Windows error that causes the system to… -
ecrypto1.com Crypto Security: Comprehensive Analysis and Best Practices
- privacy
When it comes to protecting your digital assets, ecrypto1.com offers a strong and layered approach… -
be1crypto.com Security Best Practices and Risk Assessment
- Security
Be1crypto.com is designed to protect users’ cryptocurrency assets through strong security measures. The platform uses encryption… -
Cash App Security Settlement Explained: Key Details and Impact
- smart
The Cash App security settlement offers users affected by data breaches a chance to receive… -
Network Security Key Best Practices for Stronger Wireless Protection
- privacy
A network security key is the password that protects a wireless network from unauthorized access…. -
Network Security Key Essential Guide to Safe Wireless Connections
- General
A network security key is the password used to connect devices to a Wi-Fi network. It… -
Apple security alert scam warning and how to protect yourself
- General
Many users see a sudden pop-up claiming an “Apple Security Alert” and panic. These messages… -
Security Today Magazine Layered Hospital Security: Modern Strategies for Protecting Healthcare Facilities
- General
Layered security in hospitals is becoming more important as threats to patient and staff safety… -
Power Over Ethernet Cameras for Video Surveillance Enhancing Security with Efficient Connectivity
- IOS
Power over Ethernet (PoE) cameras are a popular choice for video surveillance because they simplify… -
What Is Composite Risk Management? (Your Complete Guide to CRM Process and Implementation)
- General
You’re leading a project with multiple moving parts—tight deadlines, budget constraints, new technology, and a… -
What Does “GNG” Mean on TikTok and Instagram? (Your Guide to This Trending Abbreviation)
- General
You’re scrolling through TikTok comments or Instagram DMs when you spot it again: “GNG.” Maybe… -
How Much Does a Private Investigator Cost in 2025? (Complete Pricing Guide and What You Get for Your Money)
- Private Investigations
You suspect your business partner is hiding assets, your spouse might be cheating, or you… -
The Hidden Risks of Hiring a Private Investigator in 2025 (What Could Go Wrong and How to Protect Yourself)
- Private Investigations
You’re convinced you need a private investigator. Maybe you suspect infidelity, need to locate a… -
Are Private Investigators Legal? What You Need to Know About PI Laws and Regulations
- Private Investigations
When most people think about private investigators, images from movies and TV shows come to… -
Real Estate Secured Loans: Understanding Property-Backed Financing and Security
- Security
Real estate secured loans use property as collateral to guarantee repayment, offering borrowers access to… -
Ubuntu Root Password: Your Complete Guide to Understanding and Managing Root Access
- General
Ubuntu users often find themselves confused when trying to perform administrative tasks, wondering what the… -
Kyocera Default Passwords Command Centre
Kyocera machine passwords: General rules 1. Most machines have a username and password to enter… -
Hikvision Login: Default IP, Username, Password, Port
- Security
Hikvision is a very popular brand of surveillance cameras and security solutions. When setting up a… -
IoT App Development in 2025: A How-To Guide for Startups and SMBs
- General
As someone who has been deeply involved in the IoT space for years and has…