Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to a downgrade attack during pairing sessions. Go to Source
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to a downgrade attack during pairing sessions. Go to Source
Several well-rated pet trackers contain flaws stemming from the use of Bluetooth LE, poor certificate handling and more. Go to Source
After an Alexa speaker recorded and shared a private conversation, the tech community is casting a wary eye on voice assistant privacy issues. Go to Source
As the popularity around cryptocurrency has continued to rise in 2018, it has also paved an easy path for cash-hungry scammers to launch “cryptocurrency giveaway scams.” Go to Source
Schneider Electric on Tuesday issued fixes for a vulnerability its SoMachine Basic software that could result in disclosure and retrieval of arbitrary data. Go to Source
Cloud migration and automated systems, data privacy and encryption all remain central issues for the FBI as it considers its mandate and role in the modern digital age. Go to Source
GDPR may be going in effect Friday, but U.S. citizens have a ways to go before seeing similar privacy regulations from the U.S government. Go to Source
The new hardware-based protections Intel announced earlier in March it was embedding into new chips will only protect against Spectre and Meltdown – but not the newly disclosed Variant 4, sources said. Go to Source
Privacy advocates say facial recognition can be an agent of authoritarian surveillance; others say it’s an invaluable tool to combat kidnapping, locate lost children and track down criminals on the run. Go to Source
Yet another speculative execution side channel flaw has been disclosed in processors – and security experts warn that more may be out there. Go to Source