iot

  1. C

    Simple vlan, hardware and setup recommendations

    Hi there I am moving to a large house in the summer and will get a full gigabit connection (1000/1000). At the same time, I am giving my devices a good look over and adding some new, like Roborock robot vacuum cleaners. Unfortunately, I have given up rooting the vacuum cleaners, and I do not...
  2. D

    Amnesia:33

    In the news today, researchers found 33 security vulnerabilities in many different IoT devices, including the beloved Raspberry Pi. Does anyone have details on what exactly are the affected devices/risks...
  3. Zarathustra[H]

    Monitor IoT Activity on your Network (by giving up privacy to Princeton Researchers)

    So, Many of us have been curious about what the hell our IoT is doing on our networks, how often it dials the mother ship and what it is sending. Researchers at Princeton University want to know too, and have started a project to collect data from IoT devices on your network to inform you, and...
  4. AlphaAtlas

    Japanese Government Will Hack Their Citizen's IoT Devices

    Numerous security experts have (justifiably) expressed concern with the security of IoT devices that enter the market every day, But today, the Japanese government is doing something about it, as they will start testing the security of their own citizen's IoT devices. "NOTICE," as they call it...
  5. AlphaAtlas

    Rice Researchers Reveal Silicon Based Security Keys

    Integrated circuit designers from Rice University claim they've developed a digital fingerprint technology that is "10 times more reliable than current methods" used in IoT devices. Their "physically unclonable function," or PUF, supposedly uses physical imperfections in the security device's...
  6. AlphaAtlas

    Intel Acquires Indian Startup for GPU Talent

    The Times of India reports that Intel corporation acquired the Indian chip design startup Ineda Systems in an "all cash deal sealed last week" for an undisclosed amount. While Ineda seemingly specializes in low-power IoT hardware and autonomous driving technology, chipzilla is said to be more...
  7. cageymaru

    Thousands of IoT Refrigerators Worldwide Are Using Default Passwords

    Refrigerators worldwide featuring temperature control systems from Resource Data Management still have the default password "1234" as their login. "These systems all use the unsecured HTTP protocol and the 9000 port (or sometimes 8080, 8100, or even simply 80)." Israeli security activists Noam...
  8. cageymaru

    Intel Releases Disappointing Q4 2018 and Full-Year 2018 Financial Results

    Intel has released its Q4 2018 and full-year 2018 financial results. The fourth quarter revenue was $18.7 billion, up 9 percent year-over-year (YoY); and full-year revenue set an all-time record of $70.8 billion, up 13 percent YoY. According to CNBC, analysts had predicted a higher revenue...
  9. cageymaru

    Wi-Charge Uses Invisible Infrared Beams to Charge Devices

    Wi-Charge is a wireless system for charging phones, smart locks, wireless security cameras, IoT devices and more. Wi-Charge uses invisible, infrared light beamed from a transmitter located on a high location such as a ceiling. The room filling infrared light emitted from the transmitter allows...
  10. AlphaAtlas

    Researchers Demonstrate Hot Tub Hack

    Some hot tubs have apps that allow users to control the tubs remotely. But security researchers from Pen Test Partners found a small security flaw in one of those implementations... apparently, there is no security. A wifi access point on the tub can be configured to act as a client accessible...
  11. cageymaru

    The FCC Has Levied a $900,000 Fine Against Swarm for Unauthorized Satellite Launch

    Swarm Technologies Inc has been ordered to pay a $900,000 fine by the FCC for "unauthorized deployment and operation of satellites, unauthorized operation of earth ground stations, and other unauthorized operation and testing of radio frequency equipment." The FCC had denied Swarm Technologies'...
  12. AlphaAtlas

    White Hat Hacker Contacted a Man Through His Security Camera

    AZCentral reports that a hacker broke into a man's Nest security camera at his Phoenix home. But, instead of abusing the system, the hacker contacted the camera's owner, informing him that the system was compromised with fairly obvious proof. If you aren't already paranoid about cameras in...
  13. badcookies

    FS: 2x Smart Wi-Fi Light Switch (No Hub Required, Works w/ Alexa, Google Assistant & Cortana)

    Geeni TAP Smart Wi-Fi Light Switch No Hub Required, Works with Amazon Alexa, Google Assistant & Microsoft Cortana REQUIRES NEUTRAL WIRE I have 2 of this exact item ($25 ea): https://www.newegg.com/Product/Product.aspx?Item=9SIAENV7VT1357 I bought before realizing it requires a neutral wire...
  14. AlphaAtlas

    Jaguar Land Rover Tests Traffic Light Connection Technology

    The prediction of red lights and green lights is almost a myth among many drivers, but Jaguar-Land Rover is trying to turn it into a reality. The company is testing "Vehicle-to-Infrastructure" technology that will help drivers avoid red lights, while the "Green Light Optimal Speed Advisory"...
  15. cageymaru

    Intel to Outsource Entry Level Processor and IoT Device Production

    According to upstream supply chain sources that have confided with Digitimes, Intel is considering outsourcing the production of entry-level Atom processors, chipset, and IoT devices to foundry houses. The sources speculated that only Taiwan Semiconductor Manufacturing Company (TSMC) is capable...
  16. AlphaAtlas

    Eta Compute Brings AI to Tiny Computers Near You

    Don't have enough AI in your IoT devices yet? Eta Compute has you covered. At ARM con, the California-based startup demonstrated low power processors that can train their own neural networks, which they call "One of the holy grails of machine learning." In typical low power devices, neural...
  17. cageymaru

    Hardware Vulnerable to Google RFID Keycard Door Hack Still in Use by Other Companies

    Google security researcher David Tomaschik discovered an exploit that allowed him access to any RFID keycard enabled door on the Google campus. By analyzing the seemingly random lock and unlock codes that his door sent through the Google network, he was able to discover the encryption key...
  18. cageymaru

    Micron Technology Expands Virginia Footprint with New Plant

    Micron has decided to expand its facilities in Manassas, Virginia with a new plant that is dedicated to creating high speed memory for autonomous vehicles. The current plant in Virginia employs 1,200 engineers and technicians while the new plant is expected to be staffed by another 1,100...
  19. cageymaru

    Taiwan Develops Smart Public Bathrooms with Emergency Call Center Capabilities

    Taiwan has created smart public bathrooms that will incorporate emergency call center technology to keep Taipei residents safe at night. Flowring Technology chairman Spencer Liang says that the Internet of Things (IoT) lavatory will feature sensors that can sense odors like high levels of...
  20. cageymaru

    Robotic Vacuum Cleaners Can Be Exploited to Spy on WiFi Networks

    Dongguan Diqee 360 robotic vacuum cleaners can allegedly be exploited in two ways. Since this is an Internet of Things (IoT) device, it is connected to the internet at all times and comes with default login credentials that most customers don't change. Using these credentials the device can be...
  21. cageymaru

    Intel Drones Assist in the Preservation of the Great Wall of China

    Intel has sent drones to researchers to assist in the preservation of the Great Wall of China; specifically in the Jiankou section. By conducting surveys and taking thousands of high quality images, the drones have been instrumental in helping the preservationists to monitor the current state...
  22. FrgMstr

    Fitness App Polar Flow Exposes the Daily Routines of Government Officials

    Finnish fitness tracking app Polar Flow has been exposing the locations of any of the 30 million users of their app for years. According to researchers at the Bellingcat open source intelligence collective; even if the user sets their account to private, it was very easy to track the individual...
  23. R

    Security Flaw Can Turn Smart Cameras Into Spying Tools

    In a report from SecureList, Kaspersky Lab ICS CERT researchers decided to check how secure a popular smart cameras are. The testers looked at cameras from Hanwha Techwin, and found what they call "severe" security flaws. The team found nearly 2,000 cameras on the internet with a public IP...
  24. DooKey

    China Wants to Turn Space Debris into a Orbiting IoT

    Space debris from multiple space programs is really becoming a problem in earth orbit. To combat this issue the Chinese plan to use some of their left over components to build an IoT orbiting the earth. The plan is to attach tiny chips to most of the major components and use them for...
  25. DooKey

    A Formula One Car is an 'Internet of Things' in Itself

    Lewis Hamilton won the Formula One drivers’ championship for the fourth time in 2017. He was the fastest driver, in the best car – his Mercedes-AMG Petronas Motorsport team also won the constructors’ title. Behind the scenes the data analytics that his team used is what really pushed him to the...
  26. DooKey

    Newly Revealed Flaw Could Subject IoT Devices to Airborne Attacks

    Billions of voice-activated Internet of Things devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed last Wednesday. Hackers could exploit BlueBorne to mount an airborne attack, using Bluetooth to spread malware and access critical data, including sensitive...
  27. DooKey

    Arm is Writing a Free Secure BIOS for Device Makers

    Arm hopes to release open-source code early next year that will help secure IoT devices by encrypting their communications and installing OTA security fixes. They call this the Platform Security Architecture and published details today. Not all IoT devices have problems, but for the smaller...
  28. cageymaru

    How Juicero Evolved from IoT Tech Investment Darling to Mockery of Human Laziness

    Juicero is the latest Internet of Things (IoT) device to catch flak from not only the press and public, but also the very investors that backed the startup. The device is touted as a juicer that squeezes bags of fruits and vegetables with more force than necessary to lift the weight of two...
  29. cageymaru

    New Malware Strain Intentionally Bricks IoT Devices

    Brickerbot is a new strain of malware that intentionally bricks unsecured Linux BusyBox-based IoT devices. Unsecured devices are typically placed into service without changing the default password, thus allowing anyone that can Google the default password for a product line to take control of...
  30. cageymaru

    Vibrator Maker Fined $4 Million CAD for Tracking Customer Sexual Activity

    Canadian vibrator manufacturer, We-Vibe, has been fined $4 million Canadian dollars for tracking their customer's sexual activity without permission. Not only did they track their sexual activity illegally, the IoT device was open to hacks. Customers that used the associated app with the...
  31. cageymaru

    200,000 Wi-Fi Cameras are Open to Multiple Hacks

    200,000 WiFi cameras are currently online and open to hacking due to a Chinese firm's intentional installation of a backdoor into the firmware at the production factory. To be exact there are seven potential backdoor hacks that can be performed on these cameras to exploit them. These cameras...
  32. cageymaru

    IoT Strikes Again As Connected Teddy Bear Leaks 2 Million Recordings and Passwords

    IoT connected devices just can't get out of their own way when it comes to internet security. A stuffed animal called Cloudpets that allows you to record conversations and send them to others has been coerced into giving out 2 million recordings along with 800,000 email addresses and passwords...
  33. Zarathustra[H]

    Previous Owners of Used "Smart" Cars can Still Control Them via the Cars' Apps

    As we have covered countless times before, there are many security problems in the world of connected cars. Now there is a new one to worry about. Apparently for fear of owners getting locked out of their cars by valet's or others accidentally resetting the cars connections, car makers have...
  34. cageymaru

    IBM and VISA Want Automatic Payments for Usage and Potential Repairs

    IBM and VISA and have collaborated on how to get IoT devices to charge you in real time for usage. For example you purchase a car and want to drive out to the beach. Your car payment could be arranged to be based on usage instead of a set monthly payment. When you get to the beach, the car...
  35. cageymaru

    University Experiences DDoS Attack From IoT Vending Machines and Light Bulbs

    An unnamed university experienced a major DDOS attack from it's own vending machines, light bulbs and other IoT devices. Some hackers thought it would be fun to manually brute force some 5,000 IoT devices on the campus and set them to query seafood related domains. Students complained about...
Back
Top