People should be able to use smart devices without worry, but the current reality makes this a challenge. The way today's home IoT devices are designed and built puts functionality to the fore and often relegates security as an afterthought.
It wouldn’t be Black Hat if the conference didn’t have demonstrations that show how some technologies can be improved. This year, a lot of topics covered the IoT, as well as drones, drones, and more drones.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
One day, everything will be buttonless. Nobody will ever need to grab the remote to turn on the television or hit a switch to kill the lights. These devices will just do what they’re supposed to, all by themselves, without any physical prompts from the user.
A security informatics team in John Hopkins University has raised concerns over the security of drones (unmanned aerial vehicles or UAVs) after it hijacked one and sent it crashing.
Security researchers discovered that the Nissan’s car mobile app can be used to remotely hack any Nissan Leaf car’s features from halfway around the world.
The world is now more connected than ever. Gartner predicts 25 billion connected devices will be in use by 2020. How is this increased convenience affecting our privacy and security across the globe?
Toy firm Vtech has updated its terms and conditions, transferring the blame on future breaches to their users. In light of this, what can you do when you're dealing with a product that admits to having weak security?
Another smart toy vulnerability? Boston-based researchers found a flaw in a Fisher-Price smart toy that exposes sensitive user data, including a child’s name, birthdate, and gender.