IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | February 27, 2020

Redcar & Cleveland Council confirms ransomware attack

ComputerWeekly.com – Local authority’s systems are still offline nearly three weeks after being attacked. Redcar & Cleveland Borough Council in northern England has confirmed it has fallen victim to a ransomware attack targeting its server estate, which has kept it offline since the weekend of 8 February.

ARTICLE | February 21, 2020

Seven in 10 companies know of hacks against their IoT devices, research finds

IoT News – The IoT is barreling towards the enterprise – but companies remain highly vulnerable to IoT-based attacks, according to a new report. Earlier this month, a study titled ‘LoRaWAN Networks Susceptible To Hacking: Common Cyber Security Problems, How To Detect And Prevent Them’ by computer security firm IOActive found a host of cybersecurity issues in the LoRaWAN protocol that could put network users at risk of attacks. The study also warned about widespread disruption and even risk to life that could occur in some extreme cases.

ARTICLE | February 4, 2020

New research shows how easily LoRaWAN smart devices networks can be hacked

IoT News – A new research paper from IOActive has found a host of cybersecurity issues in the LoRaWAN protocol that could put network users at risk of attacks. The study, titled ‘LoRaWAN Networks Susceptible To Hacking: Common Cyber Security Problems, How To Detect And Prevent Them’, warned widespread disruption and even risk to life could occur in some extreme cases.

ARTICLE | February 2, 2020

Week in review: UN hacked, new Kali Linux release, Win7 upgrade dilemma

Helpnet Security – IOActive researchers found that the LoRaWAN protocol – which is used across the globe to transmit data to and from IoT devices in smart cities, Industrial IoT, smart homes, smart utilities, vehicle tracking and healthcare – has a host of cyber security issues that could put network users at risk of attack.

ARTICLE |

HACKADAY LINKS: FEBRUARY 2, 2020

Hackaday – We saw a lot of articles this week on a LoRaWAN security vulnerability. The popular IoT network protocol has been billed as “secure by default”, but a white paper released by cybersecurity firm IOActive found a host of potential attack vectors. Their main beef seems to be that client devices which are physically accessible can be reverse engineered to reveal their encryption keys.

ARTICLE | February 1, 2020

Where You Can Go In The Aftermath Of The LoRaWAN Hack

Hackernoon – IOActive released a vulnerability report for LoRaWAN.  It has been scooped by many of the usual suspects (ThreatPost, EEWeb).  I don’t think these articles really give an idea about what the vulnerability is, exactly, or what can be done.  The report is very readable, and you should read it if you’re an engineer, but if you don’t know where to start with this security stuff, I’ll try to summarize here.

ARTICLE | January 30, 2020

Millions of Devices Using LoRaWAN Exposed to Hacker Attacks

SecurityWeek – Millions of devices deployed across a wide range of sectors could be exposed to hacker attacks due to security issues associated with the use of LoRaWAN, cybersecurity firm IOActive warned on Tuesday. LoRaWAN, which stands for long-range wide area networking, is a media access control (MAC) protocol that uses LoRa technology to allow low-power devices to wirelessly communicate with internet-connected applications over long distances.

ARTICLE |

Smart cities, Ring, and the new surveillance state

Stacey on IoT Podcast – Privacy was a big theme beginning with our conversation about Ring’s sharing of certain user data with third-party tracking sites, a plea from 40 organizations for the U.S. to stop using facial recognition technology, and a new way to think about smart cities. Kevin and I also discussed proposed device security rules for the U.K. and security challenges associated with LoRaWAN networks.

ARTICLE | January 29, 2020

Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise

Dark Reading – The fast-emerging long-range wide area networking (LoRaWAN) protocol — designed to wirelessly connect low-power, battery-operated “things” to the Internet — is dangerously vulnerable to widespread attacks and compromise, security firm IOActive said in a report Tuesday. According to the vendor, its research shows that the encryption keys used for securing communications between devices, gateways, and network servers in LoRaWAN environments are weakly protected and easily obtainable.

ARTICLE |

LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems, How to Detect and Prevent Them

The Cyberwire – LoRaWAN is fast becoming the most popular wireless, low-power WAN protocol. It is used around the world for smart cities, industrial IoT, smart homes, etc., with millions of devices already connected.

Posts pagination

Previous page Page 1 … Page 9 Page 10 Page 11 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy