Security Boulevard – A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don’t take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide Area Networking (LoRaWAN) protocol is making them susceptible to hacking that could cause civic disruption and even put people at risk.
Dark Reading – To get back up and running quickly, and because it’s cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware. “Cybercriminals are turning their weapons and targeting local governments because they are easier and juicier targets.”
The Hacker News – The US-CERT today issued advisory warning users of a new dangerous 17-year-old remote code execution vulnerability affecting the PPP daemon (pppd) software that comes installed on almost all Linux based operating systems, as well as powers the firmware of many other networking devices. The affected pppd software is an implementation of Point-to-Point Protocol (PPP) that enables communication and data transfer between nodes, primarily used to establish internet links such as those over dial-up modems, DSL broadband connections, and Virtual Private Networks.
adslzone – Every few weeks we have news of a serious vulnerability discovered that puts us at risk as users of certain products or services. In this case, a major security flaw has been discovered in a Point-to-Point Protocol Daemon (pppd) software . The problem with this vulnerability is that it has been present for 17 years and no one had located it until now, allowing arbitrary code to be executed on the affected devices or systems (or malware ) to take control of them. Most Linux systems, some routers and TP-Link or OpenWRT network devices are affected.
EE Times – Low-power wide-area networks (LPWANs) are helping drive the Internet of things (IoT) explosion. They connect millions of low-power IoT and Industrial IoT (IIoT) devices into wireless networks over a range of distances, from short to really, really long, from indoor applications to those covering large fields or even cities. But device designers using the LoRaWAN standard may be lulled into thinking that just configuring its security keys is enough to prevent their devices from being hacked. A new report says it isn’t.