Hack-tualité by G-echo - IoT - Semaine 2019/07

IoT - Semaine 2019/07

IoT Pentesting 101 && IoT security 101
Tue, 12 Feb 2019 20:26:43 GMT
V33RU
Approach Methodology<p>Network<br>• Web (Front & Backend and Web services)<br>• Mobile App(Android & iOS)<br>• Wireless Connectivity<br>• Firmware Pentesting(Hardware or IoT …
Pour la première fois, l’Union européenne rappelle des montres connectées peu sécurisées
Tue, 12 Feb 2019 18:22:27 GMT
Corentin Durand
La Commission européenne agit à l'échelle du continent pour rappeler des produits dangereux.<p>Bruxelles prend des décisions pour limiter la circulation …
Automobile Hacking, Part 2: The can-utils or SocketCAN | hackers-arise
Mon, 11 Feb 2019 06:10:22 GMT
Welcome back, my aspiring automobile hackers!<p>Now that we laid out the basics of the most common protocol used in automobiles, the Controller Area …
Xiaomi Electric Scooter Found Vulnerable to Life-Threatening Hack
Tue, 12 Feb 2019 18:21:20 GMT
February 12, 2019
Smart devices definitely make our lives easier, faster, and more efficient, but unfortunately, an insecure smart device can also ruin your day, or …
Automobile Hacking, Part 1: The CAN Protocol | hackers-arise
Mon, 11 Feb 2019 06:09:56 GMT
Automobile hacking is one of the leading-edge areas of our hacking discipline. As our automobiles have become smarter and smarter, they include more …
By G-echo