Connected contraptions cause conniption for 2024
From “spying” air fryers to 3 million rogue toothbrushes, here are the strangest stories about internet-connected home goods in 2024.
Read moreFrom “spying” air fryers to 3 million rogue toothbrushes, here are the strangest stories about internet-connected home goods in 2024.
Read moreThis week on the Lock and Code podcast, we tell three stories about air fryers, smart rings, and vacuums that want your data.
Read moreCategories: Personal Tags: chastity cage Tags: IoT Tags: Internet of Things Tags: romance Tags: toy Tags: device Tags: expose Tags: user data We take a look at reports of an IoT chastity cage device which is exposing user data. |
The post Smart chastity device exposes sensitive user data appeared first on Malwarebytes Labs.
Read moreCredit to Author: BrianKrebs| Date: Fri, 03 Mar 2023 01:33:06 +0000
The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security. The White House’s new national cybersecurity strategy also envisions a more active role by cloud providers and the U.S. military in disrupting cybercriminal infrastructure, and names China as the single biggest cyber threat to U.S. interests.
Read moreCategories: News Tags: smart light system Tags: light bulb Tags: IoT Tags: Internet of Things Tags: compromise Tags: CVE In 2022, even our light bulbs have CVEs |
The post Smart lights vulnerable to “blink and you’ll miss it” attack appeared first on Malwarebytes Labs.
Read moreCredit to Author: Jonny Evans| Date: Tue, 31 May 2022 12:16:00 -0700
For industrial applications, the Internet of Things risks becoming the Internet of Thieves. Perhaps industries making use of connected solutions should take a leaf out the Apple book and lock down their infrastructure.
As digital processes become deeply embedded across every industry, it makes sense that industrial control systems were tested at this year’s Pwn2Own contest. Hackers were asked to seek out vulnerabilities in industrial software and systems.
Contest winners Daan Keuper and Thijs Alkemade found that once they managed to break into the IT networks used at these companies, it was “relatively easy” to then cause havoc with systems and equipment.
Credit to Author: Lisa Vaas| Date: Mon, 02 Mar 2020 12:37:11 +0000
You might want to unplug this not-so-smart robot: researchers found they can watch video streams piped out from its security camera.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/kGtvD8tF-C4″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Thu, 20 Feb 2020 10:03:25 +0000
Amazon is following Google’s lead by forcing all users to use two-factor authentication when logging into their Ring accounts.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ZP4hOfnjH24″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Jonny Evans| Date: Fri, 07 Feb 2020 06:35:00 -0800
The latest smart home security nightmare sheds light on the risk you take each time you add another connected item to your home, office or industrial network – and even market leading brands make mistakes.
Philips Hue smart lighting systems are probably among the most widely installed smart home solutions in the world, so plenty of people deserve to learn about the latest Check Point research which warns of a major security flaw in them.
Credit to Author: Michelle Davidson| Date: Mon, 06 Jan 2020 09:46:00 -0800
If blockchain felt more like hype than reality in 2019, prepare for that to change. Industry watchers expect 2020 to be the year the distributed ledger technology matures and we see use cases that go beyond cryptocurrency.
Areas where experts envision growth include data security, the supply chain and electronic health records.
“Someone’s gonna hit me, but I think blockchain as it relates to data security (think access management) is going to have some landmark use cases in 2020,” Siobhan Climer, science and technology writer at Mindsight, said during a recent IDG TECH(talk) Twitter chat.