IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, developed by Rapid7, is a tool for scanning default password credentials of IoT devices. It can scan specific IoT devices to determine if they are using default or factory-set passwords. Tool Introduction The recent large-scale network disruption in the United States was investigated to be caused by malware exploiting default password credentials of IoT … Read more

Handling a Server Breach: A Step-by-Step Guide

Handling a Server Breach: A Step-by-Step Guide

In the following text, locking files and directories refers to adding certain attributes to files and directories, such as read-only. chattr +ia 1. Symptoms of Server Breach Recently, a friend’s server (he set up a website himself) seemed to have been breached, with symptoms including: the server’s CPU resources being at 100% for an extended … Read more

2020 IoT Terminal Security White Paper

2020 IoT Terminal Security White Paper

Click the blue text to follow us 1. Introduction In the era of consumer internet, the value of the Internet of Things (IoT) itself has not been fully explored. With the advent of the 5G era, the IoT field has ushered in new development opportunities. The 5G communication technology defines three major application scenarios: eMBB, … Read more

Overview of Automotive Projects and Embedded Systems Based on Xen

Overview of Automotive Projects and Embedded Systems Based on Xen

Disclaimer: The content and images of this article are reprinted from BC-AUTO to the English network. 2019 Global Intelligent Automotive Cybersecurity and Information Security Industry Research Report 2019 China Onboard Gateway Industry Research Report 2019 Global and China Onboard Ultrasonic Radar Industry Research Report 2019 Global and China Surround View ADAS Industry Research Report 2019 … Read more

Using Self-Signed Certificates with QT5 for Accessing Cloud HTTPS REST API Services

Using Self-Signed Certificates with QT5 for Accessing Cloud HTTPS REST API Services

Recently, I worked on an IoT gateway project where the gateway device needed to call the cloud’s REST API. The cloud implemented certain business logic and encapsulated resources into various URI interfaces for external systems to call. As a programmer, you should be quite familiar with REST APIs. Many of the basic services around us … Read more

Understanding the IoT Gateway Market: What is an IoT Gateway?

Understanding the IoT Gateway Market: What is an IoT Gateway?

Follow the IoT Planet to track the trends in the Internet of Things! “IoT Planet” focuses on sharing technologies and applications related to the Internet of Things. The IoT gateway is a device that connects IoT devices, systems, sensors, and the cloud, capable of performing protocol conversion and data collection. It provides local processing and … Read more

Comparative Analysis of Ledger Nano S Plus and Nano X: The Best Hardware Wallet

Comparative Analysis of Ledger Nano S Plus and Nano X: The Best Hardware Wallet

Comparative Analysis of Ledger Nano S Plus and Nano X: The Best Hardware Wallet With the popularity of blockchain technology, the secure storage of crypto assets has become a key focus for investors. Ledger, as a leader in the hardware wallet field, has launched two of the most popular products on the market: the Ledger … Read more

How to Fix Your Computer’s Slow Performance and Overactive Fan

How to Fix Your Computer's Slow Performance and Overactive Fan

Your computer sometimes suddenly becomes very slow, the fan is blowing loudly, and it may be unresponsive even on a new computer. Don’t worry, you might be encountering a common issue with Windows 10 and Windows 11. You can press the shortcut keys “Ctrl+Shift+Esc” to open the Task Manager and check the background processes. The … Read more

Beware! 6 Default Configurations Favored by Attackers

Beware! 6 Default Configurations Favored by Attackers

Default configurations may contain numerous security vulnerabilities. For your network security, here are 6 products and services that need careful examination. When it comes to devices connected to corporate networks, “out of the box” seems like an enticing promise, but little do we know, it is also where the danger lies. Imagine devices being able … Read more

7 IoT Devices That Worry Security Experts

7 IoT Devices That Worry Security Experts

Every day, a large number of IoT devices that have not undergone rigorous security testing are connected to our lives. We must realize that this is a process of gradually accumulating risks. Just as we require vehicles on highways to comply with safety standards and undergo annual inspections to ensure traffic safety, there are no … Read more