In case you missed our live Lunch & Learn event in January on weaponizing vulnerabilities found in a D-Link camera, here’s your chance to watch the entire one-hour talk. Buckle up! It’s fairly technical.
Imagine this scenario: A teenager modifies the firmware code on a remote device to change signals on several trams for pubic transportation. A train crashes causing a derailment in which 12 people were injured. Not possible you say?
Today ReFirm Labs is excited to announce a new feature available to all platform subscribers. Software Bill of Materials powered by the Centrifuge Platform will generate a list of open source components that are present in a firmware image by comparing the files found within the firmware and matching them up with components.
A firmware vulnerability for the TP-Link WL-WA850RE WiFi Range Extender recently caught our attention. But we found a much more serious bug that allows a remote attacker to completely control the device.
Securing firmware with ReFirm Labs is the topic for this episode of the Recorded Future podcast. We talk with co-founder Terry Dunlap and his colorful past!
It’s our hope that this rather sensationally-titled piece will actually provide some down-to-earth developer basics for helping to make our connected world at least a little safer.
Firmware Hackers Find New IoT Vulnerabilities Firmware… it’s running on practically every internet connected device. And because it cannot be protected by traditional security products, it has become a favored target for hackers and state sponsored actors....
As the use of IoT devices continues to spread throughout the healthcare sector it is important to remember to increase IoT device security is vital to ensure patient safety.
ReFirm Labs’ co-founder Terry Dunlap talks about firmware vulnerabilities, backdoors, and more in this episode of The CyberWire Daily Podcast.