Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Telnet Backdoor Opens More than 1M IoT radios to Hijack
- This topic has 0 replies, 1 voice, and was last updated 1 year, 5 months ago by .
-
Topic
-
Researchers have found a vulnerability in the Linux BusyBox system used in Imperial Dabman IoT radios that can be exploited to gain root access, listen to streamed music, add compromised system to a botnet, or send custom audio streams
https://threatpost.com/million-iot-radios-hijack-telnet-backdoor/148123/
You must be logged in to reply to this topic.