Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

This report is jointly released by the National Internet Emergency Center (CNCERT) and Qihoo 360 Technology Co., Ltd. (Qihoo 360). 1 Overview Recently, CNCERT and Qihoo 360 have jointly monitored the emergence of a new DDoS botnet that is rapidly spreading on the internet. Tracking and monitoring have revealed that the number of domestic compromised … Read more

PumaBot Malware Targets Linux IoT Devices

PumaBot Malware Targets Linux IoT Devices

Keywords Malware A botnet targeting IoT devices running the Linux operating system attacks by brute-forcing device credentials and downloading cryptocurrency mining software. Researchers at Darktrace have named this botnet “PumaBot” because its malware checks for the string “Pumatronix,” a Brazilian manufacturer of surveillance and traffic cameras, suggesting it may target such IoT devices or attempt … Read more

Understanding Carrier Networks Through Visuals

Understanding Carrier Networks Through Visuals

What Are Transport Networks, Core Networks, Transmission Networks, and Access Networks? Today, I will mainly talk about carrier networks, their evolution, and technological trends to help beginners understand the development of networks, services, and technology. Before we delve into the knowledge, let me share a story about sending a package: I want to send a … Read more

Botnets Trigger IoT Security Battle: Discussing Embedded Security

The rise of Internet of Things (IoT) botnets has become a security threat in emerging industries such as smart homes, smart cities, and industrial networking. Distributed Denial of Service (DDoS) attacks from botnets have been around for some time, and IoT botnets are not new either. Botnets and Their Potential Threats A botnet refers to … Read more

BlackHat Topic: Expanding Botnets Using Satellite Receivers

BlackHat Topic: Expanding Botnets Using Satellite Receivers

Overview The emerging set-top boxes (STBs) belong to embedded Linux satellite TV receivers, possessing all the characteristics of Linux machines, including wireless and network connectivity. This is sufficient for hackers to crack the encryption strategies of most satellite DVB-CA receiving cards and develop a black industrial chain. Such attacks can create a fairly large botnet … Read more

How Do LCD Screens Work? What Exactly Is Liquid Crystal?

How Do LCD Screens Work? What Exactly Is Liquid Crystal?

From bulky CRT monitors and plasma TVs to the currently rising laser TVs, the family of display technologies is quite extensive. Many of these display technologies have gradually been replaced over time, but one member has been “shining” since the 1980s: the liquid crystal display (LCD). In the 1990s, CRT monitors were prevalent; they were … Read more

How Do LCD Screens Work? What Are Liquid Crystals?

How Do LCD Screens Work? What Are Liquid Crystals?

Science Is All Around Us, Let’s Start Popularizing It Popularize Science and Technology, Improve Citizen Quality, and Build a Harmonious Society From the bulky CRT monitors and plasma TVs to the emerging laser TVs, the family of display technologies is quite extensive. Many of these display technologies have gradually been replaced over time, but one … Read more

Silent Threats Inside IoT Devices

Silent Threats Inside IoT Devices

As more and more smart devices are installed in homes, all these cheap connected devices bring new security issues to the entire family and society. This problem is becoming increasingly complex as companies are significantly increasing the number of sensors and remote monitors used to manage office environments and detailed manufacturing processes in factories. At … Read more