Hack-tualité by G-echo - IoT - Semaine 2019/06

IoT - Semaine 2019/06

3 ways state actors target businesses in cyber warfare, and how to protect yourself
Tue, 05 Feb 2019 02:30:47 GMT
James Sanders
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in …
CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols
Fri, 08 Feb 2019 19:51:09 GMT
<i>This software project is a result of a Bachelor's thesis created at SCHUTZWERK in collaboration with Aalen University by Philipp Schmied.</i> <i><br>Please refer</i> …
European Commission orders mass recall of creepy, leaky child-tracking smartwatch
Mon, 04 Feb 2019 20:19:04 GMT
By Rebecca Hill 4 Feb 2019 at 17:16
The European Commission has ordered the recall of a smartwatch aimed at kids that allows miscreants to pinpoint the wearer's location, posing a …
Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users
Mon, 04 Feb 2019 20:14:58 GMT
Zeljka Zorz, Managing EditorFebruary 1, 2019
5G cellular mobile communications, when implemented, are expected to provide high bandwidth, low latency, energy savings, better connectivity, but …
By G-echo

Pour aller plus loin

Ressources