Tag: iot
You are here: Home \ iot \ Page 5
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to a downgrade attack during pairing sessions.
Several well-rated pet trackers contain flaws stemming from the use of Bluetooth LE, poor certificate handling and more.
After an Alexa speaker recorded and shared a private conversation, the tech community is casting a wary eye on voice assistant privacy issues.
The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.
A team of academic researchers has demonstrated that it’s possible to possible to closely mimic legitimate voice commands in order to carry out nefarious actions on these home assistants.
Threatpost talked to several security researchers about what’s changed in the past year.
Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices.
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.
The actors behind this kind of code, whether they’re bent on sending a political message or simply wanting to cover their tracks after data exfiltration, have adopted various techniques to carry out those activities.
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security.
123456789 ... 18 ...