IoT Unravelled Part 3: Security
Troy Hunt
NOVEMBER 25, 2020
Here we had a situation where an attacker could easily control moving parts within a car from a remote location. Another example also from Context Security was the vulnerability in CloudPets talking (and listening ) teddy bears that amounted to no auth on the Bluetooth allowing an attacker to take control of the toy.
Let's personalize your content