Researchers reiterate that wearables are vulnerable to different attack scenarios that risk users’ privacy and security. How do we go about securing the use of wearables and other IoT devices?
Researchers found US-based traffic systems vulnerable to data spoofing attacks, where smart intersections are tricked into indirectly causing traffic slowdowns.
An increasing number of home owners are installing internet-enabled voice assistants, creating more convenient and connecetd environments. However, these devices expose users to unique privacy and safety issues.
Smart security systems in buildings allow for easier, centralized management of security and safety, but these connected systems also come with exploitable vulnerabilities. This infographic provides a guide for managing these systems and securing devices.
From what we've seen in CES 2017, the future can be summed up in a single word: smarter. At the same time, there is always the need to push security at an equal pace with innovation.
The inevitable rise of IoT homes is driving a market hungry for convenience and efficiency, but this trend is also bringing up serious concerns. Who is ultimately responsible for securing IoT homes: buyers or manufacturers?
It wouldn’t be Black Hat if the conference didn’t have demonstrations that show how some technologies can be improved. This year, a lot of topics covered the IoT, as well as drones, drones, and more drones.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
A security informatics team in John Hopkins University has raised concerns over the security of drones (unmanned aerial vehicles or UAVs) after it hijacked one and sent it crashing.