IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | December 13, 2018

Flying Secure

Avionics Magazine – In December 2017, IOACTIVE cybersecurity researcher Ruben Santamarta demonstrated his ability to establish a shell presence on a real in-flight airborne commercial airplane internet modem. The general public, though, would not learn about the demonstration until mid-2018, when Santamarta released a preview of a 70-page report detailing how the flaws exposed in that modem also allowed him to spy on cargo ships and hidden military bases.

ARTICLE | November 30, 2018

7 Steps You Can Take to Avoid Getting Hacked

Complex – No matter how many measures you take to protect your personal information, the unfortunate truth is that no computer is truly safe. Any device that connects to the internet is theoretically vulnerable to being hacked, which means everything from your bank account to your credit cards to your social media accounts could be compromised, if your personal data were to fall into the wrong hands.

ARTICLE | November 29, 2018

WHAT’S ON: BOMA’s big holiday bash, Make-A-Wish members Christmas push

Real Estate Weekly – Dec. 4: The commercial real estate development association will host Building a Better NJ: Future Proof Your Buildings at the EY Learning Center, 121 River Street, Hoboken, N.J. from 2:30 – 6 p.m. The series will examine the importance of keeping pace with technology to ensure that commercial real estate properties remain viable, desirable and compliant in the future.

ARTICLE | November 28, 2018

This Chinese Billionaire Wants to Put Human-Like Robots in Your Home

Bloomberg – Chinese robotics billionaire James Zhou scored a win this year when Tencent Holdings Ltd. helped fund his startup at a $5 billion valuation. But Zhou’s already chasing more cash. The goal? To make his singing, dancing, yoga-teaching robots more lifelike.

ARTICLE | November 21, 2018

Global Connected Car Security Solutions Market 2018 Insights and Trends: Harman, Arxan, Argus, Guardtime, Infineon

Digital Journal – The Connected Car Security Solutions Market is defined by the presence of some of the leading competitors operating in the market, including the well-established players and new entrants, and the suppliers, vendors, and distributors. Connected car security solutions is a radio communication service used permanently or temporarily for the safeguarding of connected cars. A connected car is a car that is equipped with Internet access, and usually also with a wireless local area network.

ARTICLE | November 20, 2018

Raft of flaws discovered in MiSafes child-monitoring devices

The Daily Swig – Once again, a child-monitoring gadget has been found to be vulnerable to hackers, leaving 14,000 children open to location tracking, phone calls from strangers, and more.

ARTICLE | November 14, 2018

How Your Security System Could Be Hacked

24/7 Home Security – When it comes to burglary, we often imagine individuals who use brute force to break into your doors and windows, take all your valuables, and then attempt to run away before police arrive. Our existing security systems are designed for for those kind of criminals. But with the rise of smart security systems, what if criminals have learned to bypass your system and disable your alarms?

ARTICLE | November 13, 2018

Securing Industries, One Hack At A Time

Forbes – Information security companies sometimes get blow back from legitimate research that might at first be seen as an unnecessary embarrassment to an entire industry, then in retrospect understood as a necessary—if painful– first step. “If you look at the automotive industry,” said Jennifer Sunshine Steffens, CEO of IOActive, a security company which is celebrating its 20th year this year, “we had been doing work in automotive security research for years. But it took one video going viral — and the talks that came from it — to wake folks up and actually be empowered to do something about it”

ARTICLE | November 12, 2018

Staying Safe in the Automated Workplace

AuthO – While humans traditionally have staffed assembly lines, prepped and served food, and entered data into spreadsheets — more and more, machines are taking over these tasks.

ARTICLE | November 5, 2018

7 Non-Computer Hacks That Should Never Happen

Dark Reading – You might look at an old fax machine or dusty printer and just see out-of-date technology that you can’t even use to send email. You might look at the company mailroom as just a place to collect unsolicited junk mail you’ll soon throw in the trash. Attackers may see something different: vulnerabilities, often ignored by your security department. Cyberrattacks on non-computer vectors are more common than you think.

Posts pagination

Previous page Page 1 … Page 22 Page 23 Page 24 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy