The Daily Swig – Once again, a child-monitoring gadget has been found to be vulnerable to hackers, leaving 14,000 children open to location tracking, phone calls from strangers, and more.
24/7 Home Security – When it comes to burglary, we often imagine individuals who use brute force to break into your doors and windows, take all your valuables, and then attempt to run away before police arrive. Our existing security systems are designed for for those kind of criminals. But with the rise of smart security systems, what if criminals have learned to bypass your system and disable your alarms?
Forbes – Information security companies sometimes get blow back from legitimate research that might at first be seen as an unnecessary embarrassment to an entire industry, then in retrospect understood as a necessary—if painful– first step. “If you look at the automotive industry,” said Jennifer Sunshine Steffens, CEO of IOActive, a security company which is celebrating its 20th year this year, “we had been doing work in automotive security research for years. But it took one video going viral — and the talks that came from it — to wake…
AuthO – While humans traditionally have staffed assembly lines, prepped and served food, and entered data into spreadsheets — more and more, machines are taking over these tasks.
Dark Reading – You might look at an old fax machine or dusty printer and just see out-of-date technology that you can’t even use to send email. You might look at the company mailroom as just a place to collect unsolicited junk mail you’ll soon throw in the trash. Attackers may see something different: vulnerabilities, often ignored by your security department. Cyberrattacks on non-computer vectors are more common than you think.