In-brief: privacy researchers warn that the media access control (MAC) addresses that identify connected devices pose a serious privacy risk to individuals: allowing would-be attackers or businesses to collect a wealth of data about an individual’s movements, activities and preferences.
Search Results for "embedded device"
Under The Hood: Wireless Software Links Teslas, Drones
In-brief: The same wireless software that powers a consumer quadcopter is also under the hood of Tesla’s Model S, according to a leading security expert – underscoring the increasingly long and complex software supply chain for connected products.
Pentagon looks to analog monitoring to secure IoT
In-brief: DARPA is directing $36m for the first stage of a program called LADS – Leveraging the Analog Domain for Security, which is looking into analog methods of cyber threat detection, including power consumption monitoring.
Java is My Co-Pilot: Weighing the Security of Connected Cars
In-brief: scandals like the one gripping Volkswagen and the hack of vehicles by Chrysler Fiat have a common thread: a lack of transparency about the software that powers modern cars. A panel at the recent Security of Things Forum took up this issue, and we have the video to share.
Hard Coded Password Sinks Fleet of DSL Routers
In-brief: A hard coded firmware password could provide remote hackers with access to a wide range of home broadband routers, underscoring the risk posed by shared hardware and software, according to an alert from Carnegie Mellon University’s CERT this week.