Remove your-new-smart-devices-could-be-your-new-problem
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 2 , I covered IP addresses and the importance of a decent network to run all this stuff on, followed by Zigbee and the role of low power, low bandwidth devices. But there are also some quick wins, especially in the realm of "using your common sense". Now for the big challenge - security. Let's dive into it.

IoT 358
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Within the last couple of months, smart device vulnerabilities have been piling up, prompting businesses to protect their Internet of Things (IoT) environments. But that doesn’t just include thermostats, printers, and other connected devices that you have to protect — it now means electric cars, too.

Hacking 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Friends Don't Let Friends Use Dodgy WiFi: Introducing Ubiquiti's Dream Machine and FlexHD

Troy Hunt

Since that time, Ubiquiti has occasionally sent me new bits to play around with. I fixed the poor Wifi on my jet ski with their UniFi Mesh bits (I know, the most first world of problems). Most of them are being broadcast by the Telstra box on Raf's shelf: Fon WiFi gets bundled into Telstra devices , Telstra Air is.

Wireless 347
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) For the first expert interview on our blog, we welcomed Pulitzer-winning investigative reporter Byron V.

article thumbnail

Four ways technology can improve your Christmas celebrations

CyberSecurity Insiders

Believe it or not, Father Christmas is not the only one who can weave some magic and solve many of those problems. With the help of smart technology, even some of the most challenging festive frustrations can be made a thing of Christmas past. Smart devices for Christmas cooking. Mobile wallets to help you shop.

article thumbnail

Google to Fix Location Data Leak in Google Home, Chromecast

Krebs on Security

New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network. The attack content could be contained within malicious advertisements or even a tweet.”

IoT 186
article thumbnail

Four ways technology can improve your Christmas celebrations

CyberSecurity Insiders

Believe it or not, Father Christmas is not the only one who can weave some magic and solve many of those problems. With the help of smart technology, even some of the most challenging festive frustrations can be made a thing of Christmas past. Smart devices for Christmas cooking. Mobile wallets to help you shop.